1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
1 year ago
6

What is missing link describe briefly with an example class 11?

Computers and Technology
1 answer:
allsm [11]1 year ago
6 0

A missing link is a long-extinct organism that filled in a gap between closely related species that now coexist on Earth, such as between apes and humans or reptiles and birds.

A possible or recent transitional fossil is referred to as the "missing link." In the media and in popular science, it is widely used to describe any novel transitional form. Initially, the expression was used to describe a hypothetical transitional form that existed between anthropoid ancestors and anatomically modern humans. The term was influenced by both the pre-Darwinian evolutionary theory known as the Great Chain of Being and the now discredited notion that simple species are more primitive than sophisticated ones. Human evolutionary phylogenetic tree. Since evolutionary trees only hold information at their tips and nodes, and the rest is relied on conjecture rather than fossil evidence, geneticists have supported the idea of the "missing link." But anthropologists no longer like it because of what it suggests.

Learn more about missing link  from

brainly.com/question/1968231

#SPJ4

You might be interested in
You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintai
lukranit [14]

Answer:

123

Explanation:

123

7 0
3 years ago
. Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
ZanzabumX [31]

You have to make sure the BIOS boot is set to the normal hard drive first, then plug in the SATA cable and power properly

8 0
3 years ago
Can you help me match the ships to the right number?​
valina [46]

Answer:

is not clear so if u ca make it a lil bit visible ima help u out

Explanation:

sorry

4 0
3 years ago
Draw a full binary tree of height 2. How many nodes does it have?
Paraphin [41]

Answer:

The number of nodes in a full binary tree of height 2 = 7

Explanation:

At each level k, of the full binary tree there are usually 2^{k} \\ nodes.

So the full binary tree of height 2 has nodes= 2^{0} \\ + 2^{1} \\ + 2^{2} \\.

which is 7.

6 0
4 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
Other questions:
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • You have a workstation running windows vista business that you would like to upgrade to windows 7 ultimate. you want to perform
    11·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
    13·1 answer
  • When is padding required for a structure type variable? Group of answer choices When the structure contains a word-type variable
    9·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
    10·1 answer
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • Describe how a black and white image could be represented in binary
    11·2 answers
  • What is another term used for next generation firewalls
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!