1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
4 years ago
8

Tolerance to any drug decreases with non-use

Computers and Technology
2 answers:
ElenaW [278]4 years ago
8 0
<span>A person addicted to a drug to which they've built tolerance may overestimate</span>
Harman [31]4 years ago
4 0
True, your body starts to go back to it’s normal tolerance before the use of any substance
You might be interested in
Which of these are examples of metadata for an audio file of a song recording?
alexandr1967 [171]

Answer:

B

Explanation:

The metadata is only the information in the background aka the info not directly given.

5 0
3 years ago
Read 2 more answers
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation throughout a document. Which
Ivan

Not really is she wants the words that she's typing down sometimes it's not necessary to leave it to the auto correct It can always be bad when re-reading it again.

5 0
3 years ago
The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​
yulyashka [42]
Option A is the main component
3 0
2 years ago
Other questions:
  • What is life all about?
    15·2 answers
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • Are mobile phones hazardous to your health?
    13·2 answers
  • Write an if statement that assigns 100 to x when y is equal to 0.
    7·1 answer
  • What is human data,
    8·1 answer
  • Repeated execution of a set of programming statements is called repetitive execution.
    7·1 answer
  • Suggest names for a coding club
    10·1 answer
  • Computer Hardware can consist of a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!