1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
3 years ago
8

Which of the following is a true statement?

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
4 0
Let me help you!
Did you know that both plants and animals undergo cellular respiration? The reason behind that is because both organims needs to get energy and to expel wastes.

Therefore, the correct answer for your question is: <span>C.Cellular respiration occurs in both plant and animal cells.

I hope that helped you! :></span>
You might be interested in
What is ms- power point?​
WITCHER [35]

Answer:

Microsoft PowerPoint is a powerful slide show presentation program. It is a standard component of the company's Microsoft Office suite software, and is bundled together with Word, Excel, and other office productivity tools. The program uses slides to convey information rich in multimedia.

hope it work️

5 0
3 years ago
Read 2 more answers
Write a program that, given an integer, sums all the numbers from 1 through that integer (both inclusive). Do not include in you
fgiga [73]

Answer:

let n = 10;

let sum = 0;

for(i=1; i<=n; i++) {

if ((i%5) && (i%7)) {

 sum += i;

}

}

console.log(`Sum 1..${n} excluding 5 and 7 multiples is ${sum}`);

Explanation:

This is in javascript.

example output:

Sum 1..10 excluding 5 and 7 multiples is 33

5 0
3 years ago
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
Create a new Java project/class called Examine1. Prompt user as to how many numbers they would like to enter. Use a cumulative s
Zinaida [17]

Answer:

Explanation:

The following code is written in Java and like requested prompts the user for a number to continue or a letter to exit. Then loops and keeps adding all of the numbers to the sum variable and adding 1 to the count for each number entered. Finally, it prints the sum and the average using printf and the variables.

import java.util.Scanner;

class Examine1 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int sum = 0;

       int count = 0;

       System.out.println("Enter a number to continue or a letter to exit.");

       while(in.hasNextInt()) {

           System.out.println("Enter a number:");

           sum += in.nextInt();

           count += 1;

       }

       System.out.printf("The sum is %s.%n", sum);

       System.out.printf("The average is %s.", (sum / count));

   }

}

8 0
3 years ago
Professionally, depending on your career, you might use Excel to:
morpeh [17]

1. To track inventory on excel you should have thorough knowledge on how it is used and different techniques and buttons behave on it. Tracking inventory may use formulas for example the total amount of items sold for the specific day. So where to right formulas and how to use them should be learned.

2.Track personal loan will take a little knowledge about the tool and again here also a little amount of formulas can be used and thus will need a little knowledge that where to write them but will need less knowledge than first one.

3.Evaluation of commitments will need a very low knowledge about tool and can be used easily.

4. Track a project It also need a little knowledge about the tool and will need least knowledge if compared with other options.

6 0
3 years ago
Other questions:
  • Consider the binary search tree constructed for the words oenology, phrenology, campanology, ornithology, ichthyology, limnology
    14·1 answer
  • In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
    5·2 answers
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • What is the grooming process as it relates to online predators?
    12·2 answers
  • For this problem, use a formula from this chapter, but first state the formula. Frames arrive randomly at a 100-Mbps channel for
    8·1 answer
  • What is an Operating system??
    5·1 answer
  • What kind of power does Tesla Model S, 3 X, and Y use?
    8·2 answers
  • What is ur favorite color and why
    9·2 answers
  • Can someone please help? i am trying to code my raspberry pi pico in python, and it says this is wrong. Can someone help tell me
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!