1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
9

The length of a pencil would most likely be measured in:

Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
8 0

Answer:

centimeters

Explanation:

Nataliya [291]3 years ago
6 0
The length of the pencil would most likely be measured in centimeters.
You might be interested in
What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
katen-ka-za [31]
According to its structure I'd say that this is SEAL (<span>Software-Optimized Encryption Algorithm). It's difficult to describe how it works, because this kind of ciphers is very tricky. This algorithm uses 160 bit key and it uses 3 tables (R, S, T) to encode and decode.

I'll attach the image where you can see a process of creating a pseudo-random function:
</span>

7 0
3 years ago
A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and ________
dmitriy555 [2]

Answer:

It would be Store

Explanation:

hope this helps if not sorry :(

3 0
3 years ago
When an employee is told that his job will be outsourced within a year, he knows that his job will become unnecessary
Anvisha [2.4K]
False!! Hope this helps
8 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
I need help <br> Match each words with its definition!!!<br> Please helpppppppp
satela [25.4K]

Answer:

Top to bottom Answer in order

#1 hardskills

#2 goal

#3 value

#4 soft skills

#5 on the job training

#6 self training

6 0
3 years ago
Other questions:
  • Under which key category do the Page Up and Page Down keys fall?
    10·2 answers
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • Caleb is a big fan of science fiction, so he loves picturing the ________ gland as the captain of his personal starship, pulling
    9·1 answer
  • Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
    10·1 answer
  • List the gcc command-line options for each of the following: Generate a .o file rather than an executable. Generate a .s (assemb
    6·1 answer
  • Perform depth-first search on each of the following graphs; whenever there's a choice of vertices, pick the one that is alphabet
    8·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
    11·2 answers
  • How can Technology be used in marketing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!