1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
14

Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable

Computers and Technology
1 answer:
dangina [55]3 years ago
5 0
When comparing the tools stone is the least durable, followed by bronze, then iron
You might be interested in
4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
zysi [14]
First, convert feet to inches. The ' denotes foot measurement while the " denotes inches. Since there are 12 inches in a foot,

5'10" = (5*12) + 10 = 70 inches
6'8" = (6*12) + 8 = 80 inches

a.) The lower limit is 70 inches while the upper limit is 80 inches.
b.) First, divide 78 inches by 12. That would 6.5 or 6 and a half feet. Since half foot is 6 inches, the length of the couch is 6'-6"
c.) Since the couch is between the limits, yes it would fit the space.

7 0
3 years ago
Assignment 2: room area <br>programming python in Project Stem​
White raven [17]

Answer:I love Python, very useful

Explanation:python is very easy and user friendly!

8 0
3 years ago
What is 1gb in bits?​
Irina-Kira [14]

Answer:

8e+9

Explanation:

3 0
4 years ago
Read 2 more answers
How do you give <br>brainlieset ​
Ray Of Light [21]

It has to be two people answering.Then vote braniest to who's answer you think is better.

8 0
3 years ago
What's good computing?
cestrela7 [59]

Answer:

1.Use passwords that can't be easily guessed, and protect your passwords.

2.Minimize storage of sensitive information.

3.Beware of scams.

4.Protect information when using the Internet and email.

5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.

7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

9.Don't install or download unknown or unsolicited programs/apps.

Secure your area before leaving it unattended.

10.Make backup copies of files or data you are not willing to lose.

Explanation:

7 0
2 years ago
Other questions:
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • How do you open Microsoft Excel 2013 with Windows 8?
    13·1 answer
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • Difference between switch case and if else statement.​
    11·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • Why does the IPv6 format use letters and numbers?
    12·1 answer
  • Please help. will give u brainliest!! khan academy computers and the internet!!
    12·1 answer
  • Creating a Venn diagram takes specialized computer software.
    15·2 answers
  • Identify 5 internal and external hardware components of a server
    5·1 answer
  • What do you mean by computer ethics?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!