1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
10

A college asks you to write about a novel that is meaningful to you. What should you include in this essay?

Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0

The answer is C because they want you to compare it your or others lives.

You might be interested in
MCQ: Which of the following network is confined to a relatively small area?
kobusy [5.1K]

Answer:

<em>D Lan</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>

3 0
2 years ago
Read 2 more answers
Hillary’s family is thinking of relocating to a different city to save money. They set up a budget comparing the cost of living
vova2212 [387]

Answer: Oakland, and also a city they feel is the safest + best for there family

Explanation:

3 0
2 years ago
The theory advanced by Adam Smith,
tester [92]

Answer:

Definition: The unobservable market force that helps the demand and supply of goods in a free market to reach equilibrium automatically is the invisible hand. Description: The phrase invisible hand was introduced by Adam Smith in his book 'The Wealth of Nations'.

so ans is the invisible hand

hope help full thnk u❤️❤️❤️

3 0
3 years ago
Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap
Charra [1.4K]
<span>Storage costs of magnetic tape are much lower than semiconductor storage (chip storage), but they take longer to access because they are not on-board the system and have to be added manually. Chip memory, on the other hand, can be used as primary storage for a system even with a higher cost because it's typically directly connected to the system board and is much more easily accessible by the system.</span>
8 0
3 years ago
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Other questions:
  • The dlci field in the frame relay header is _________ bits long.
    14·1 answer
  • The ability to memorize well is an example of
    6·2 answers
  • When evaluating mining results, data mining and evaluating becomes
    6·1 answer
  • Componets of computer
    5·1 answer
  • (1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
    7·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • ................. are used to summarize data (option) (a) report (b) action ​
    12·2 answers
  • The cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. Declare a const named CENTS_PER_POUND and initi
    12·1 answer
  • Write a short-essay discussing your own stand on social media usage for students.​
    5·1 answer
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!