1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
8

How fast can the winds blow in a tornado?

Computers and Technology
2 answers:
sp2606 [1]3 years ago
6 0
Over 200 mph generally now I says 300 mph
avanturin [10]3 years ago
3 0

Answer:

over 200 hundred mph

Explanation:

You might be interested in
Which tool ia used to create the world wide web?
avanturin [10]

Answer:

HTML

Explanation:

HTML is the correct answer

5 0
3 years ago
When citing an Internet source:__________. a. it is ok to omit quotation marks if you change some words in the original sentence
ludmilkaskok [199]

Answer:

c. it is ok to omit quotation marks for a paraphrase of the source.

Explanation:

Plagiarism can be defined as the act of representing or using an author's work, ideas, thoughts, language, or expressions without their consent, acknowledgement or authorization.

In order to avoid plagiarism, it is very important and necessary to reference or cite the source of the informations and data.

However, when citing an Internet source, it is ok to omit quotation marks for a paraphrase of the source because the idea, thoughts or intellectual work as being rephrased.

3 0
3 years ago
Unit 2: Lesson 6 - Coding Activity 1
gogolik [260]

Answer:

easyy

Explanation:10 smaple runs and 2

4 0
3 years ago
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Other questions:
  • Chdtp aoxophg gr72 ae9>3 zqqz
    12·1 answer
  • Which is not an example of a lighter-than-air gas?
    5·2 answers
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Write a program that will print out statistics for eight coin tosses. The user will input either an "h" for heads or a "t" for t
    14·1 answer
  • What is the definition of the word uproot?
    15·1 answer
  • Pls help me<br> first one to answer correctly gets brainly points
    6·2 answers
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!