1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
4 years ago
13

What type of elements are bridges exposed to yearly

Computers and Technology
2 answers:
Svetach [21]4 years ago
8 0
Weather, Ship collision, weight of transportation
Anvisha [2.4K]4 years ago
7 0
the answer would be ship collision
You might be interested in
If a device does not require a driver, it is _____.
xxTIMURxx [149]

Answer:

(B) plug and play

Explanation:

If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.

7 0
4 years ago
Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
stiks02 [169]

get organized because of the beging when she start she will want ot be nice and fresh on everything

7 0
4 years ago
What kind of output device would not be used to output images
saveliy_v [14]

Answer:

Speakers.

Explanation: Cause they only output sound, and are devices, further more they are not used to output images, like how could speakers output images using sound? They can't.

3 0
3 years ago
What is the recommended point size for a slide title?<br> 12–22<br> 24–40<br> 44–66<br> 54–80
jenyasd209 [6]
12-22 hope this helps :)
3 0
3 years ago
Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
Katyanochek1 [597]

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

5 0
3 years ago
Other questions:
  • How to ask for a letter of recommendation via email?
    10·1 answer
  • Describe how using active listening at work can help you be a better employee.
    15·1 answer
  • Which feature is an interface between the user and the file system of a computer?
    6·2 answers
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • The term that refers to the standard computer language for creating web pages is called:
    6·1 answer
  • Ayuda necesito 7 objetos que se utilizan en la vida diaria
    8·1 answer
  • If you can photoshop please text me i need help for my digital media class 7862381441
    9·1 answer
  • Anyone want to play mine mincraft w/ me?
    9·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!