1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
14

Get these points why they hot!!!!!!!!!!!!!!!!!!!!

Computers and Technology
2 answers:
sweet-ann [11.9K]3 years ago
7 0
Hey there Jay!

Based on this, I found some sources to help understand further on this. So, from understanding quite everything, I understand how they were seriously influenced by many romantic qualities from other's. So, based on this, I believe that "they created romantic fantasies" would be the correct answer.

Hope this helps you Jay (and btw, I'm not sure how point's are hot) lol.



Solnce55 [7]3 years ago
5 0

Answer:

C.They placed more emphasis on science.

You might be interested in
Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
galben [10]

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

4 0
3 years ago
an organization that maintains a gateway to the Internet and rents access to customers on a per-use of subscription basis\ and W
shtirl [24]
1. An organisation that maintains a gateway to the internet and rent access to customers on a per use of subscription basis is called INTERNET SERVICE PROVIDER [ISP]. Internet service providers are of various forms, it can be commercially or privately owned, it can also be owned by a community. The internet access provided by ISP can be inform of cable, DSL or dial up. ISP provide other services such as website building and virtual hosting.
2. Internet protocol [IP] refers to a set of rules that guide the format of data sent over the internet, it is the method by which data is sent over the internet from one computer to another computer. Each computer that is linked to the internet has a unique IP address by which it is identified and distinguished from all other computers on the internet.
8 0
3 years ago
when water is poured into a styrofoam cup, nothing happens. the water stays in the cup and it can be used for drinking. however,
KengaRu [80]

The backside of the cup disappears and the fuel pours out due to the fact styrofoam is a trading name for polystyrene (PS) foams, Gasoline is crafted from a mixture of hydrocarbons, so it dissolves PS, generating a viscose paste.

Gasoline is crafted from a combination of volatile, flammable liquid hydrocarbons derived from petroleum and used as gas for internal-combustion engines. It is likewise used as a solvent for oils and fats. Gasoline is a form of gas crafted from crude oil and different petroleum liquids. Gasoline is mostly used as an engine gas in vehicles.

Learn more about gasoline at brainly.com/question/28762820

#SPJ4

3 0
2 years ago
Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
almond37 [142]
<span>a spreadsheet and a printer</span>
7 0
3 years ago
Read 2 more answers
A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file ca
skelet666 [1.2K]
True. An encryption scheme doesn't care what it is encrypting, be it compressed or uncompressed.

Note that an encrypted file will look like random data to most compression algorithms, so it makes sense to first compress, then encrypt, to get the maximum efficiency from the compression.
3 0
3 years ago
Other questions:
  • Write a recursive method named binarySearch that accepts a sorted array of integers and an integer target value and uses a recur
    6·1 answer
  • Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems,
    13·1 answer
  • Which of the following actions is an example of "window dressing?" a. Using some of the firm’s cash to reduce long-term debt. b.
    13·1 answer
  • Please help with attached file
    8·2 answers
  • A single-user database system automatically ensures ____ of the database, because only one transaction is executed at a time.
    13·1 answer
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei
    12·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • Opinion on sandshrew​
    13·1 answer
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!