1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
15

Match the items.

Computers and Technology
1 answer:
Kobotan [32]3 years ago
7 0
1.
migration - instinct

2.
grouping of plants and animals - biome

3.
mouth watering when smelling good food - conditioned

4.
home of bison and deer - grasslands


5.
biome caused by dryness - desert

6.
brushing your teeth - habit

7.
bacteria - decomposer

8.
one event caused by another - response

9.
blinking your eye - reflex

10.
humans - consumers

11.
all green plants - producer

12.
most northern biome- tundra

13.
putting together puzzles - trial and error,

14. mostly trees as growth - forest

,reflex, instinct, decomposer, trial and error, response, conditioned, habit, tundra, forest, consumers, producer, biome, desert, and grasslands , , , , , , ,
You might be interested in
explain how a computer screen and the eye interact to produce the variety of colors that we see from the 3 colors that are actua
Dima020 [189]

Answer:

Each pixel of light coming from your computer is made up of a combination of Red, Blue and Green light of different intensities. As this pixel of light is so small your eye only "sees" the combination of those 3 pixels as the intended colour. (as opposed to just red, green and blue light) (This is also known as additive colour mixing)

5 0
3 years ago
Microsoft Excel used for making document and presentation.
dalvyx [7]

Explanation:

Charts that are created in Excel are commonly used in Microsoft Word documents or for presentations that use Microsoft PowerPoint slides. Excel provides options for pasting an image of a chart into either a Word document or a PowerPoint slide. You can also establish a link to your Excel charts so that if you change the data in your Excel file, it is automatically reflected in your Word or PowerPoint files.

5 0
3 years ago
When utilizing the Internet Storage Name Service (iSNS), how can you limit which targets iSCSI initiators can discover and conne
Sati [7]

Answer:

You can limit by devices IQN, DNS name, MAC address, IP address

Explanation:

When you configure an iSCSI target, you define which iSCSI initiators can connect to an iSNSI by the client's IQN. You can also specify which servers can connect to the iSCSI target based on MAC addresses, IP address, and DNS name.

6 0
3 years ago
In a food chain are living creatures that eat organisms from a diferente population?
marysya [2.9K]
I’m thinking predator? Or maybe consumer?
3 0
2 years ago
Read 2 more answers
Which of the following is an example of how technology has played a role in globalization?
Eva8 [605]
B would be the more logic answer
4 0
3 years ago
Read 2 more answers
Other questions:
  • It can be useful to have a mentor because they will help you
    7·2 answers
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    15·1 answer
  • A research team is studying parallel computing. They want to run parallel process without having to use multiple processors. How
    7·1 answer
  • You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
    15·1 answer
  • Which feature is used to summarize data from multiple worksheets but does not require that the data be in the same location on e
    12·1 answer
  • Which task can a company perform with intranets
    8·1 answer
  • Describe a sub routine​
    8·1 answer
  • An optical fibre has an attenuation of 0.3 dB/km. If a laser launches an optical power level of PIN (mW) into 35 km length of th
    8·1 answer
  • What is the correct format to use when<br> inserting a date in Excel?
    15·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!