1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
13

Electricity was seen as a mysterious force and began to creat a stir when people called​

Computers and Technology
1 answer:
atroni [7]3 years ago
3 0

This isn't related to computers and when you look it up all it comes up with a Stars Wars.

You might be interested in
What will Jason need to assemble a microcomputer and connect it to memory chips
lisabon 2012 [21]

会いたいんだ

愛したいんだ

その愛がもう今見たいんだ

会いたいんだ

愛したいんだ

今かっさらう So watch out now!

6 0
3 years ago
4. The programmer who focuses on implementing the game mechanics, rules, and other elements essential for gameplay is the
Snezhnost [94]
The answer would be gameplay programmer, as they are responsible for the implementation of gameplay  mechanics.
7 0
3 years ago
What new england industry quickly collapsed with the discovery of oil in pennsylvania
Elena-2011 [213]

It was the whaling industry.  Whaling use to be the main source of oil that was used for fuel and lighting in America which was based in the coastal communities of New England.  It went into decline when oil was discovered in 1859.  Eventually it replaced whale oil as a source of fuel and life.

6 0
3 years ago
Read 2 more answers
Take the hypothetical situation that your business is considering a move to the cloud for core systems that contain confidential
zvonat [6]

Answer:

Solutions: to have a non-related to the company account and a back-up system.

Explanation:

My proposal is to move all the information of the bussiness to the cloud for better use of the data.

This data contains confidential health and finantial information and, in order to avoid any information non-wanted exit, the account has to be completing separated from the bussiness name  (more accounts),  by this way, it will be harder for extserns to get in it and substract the confidential information.

Also, the account must have a series of  security blocks to make it harder to  enter.

Finally, in case a virus gets in it and deletes any information, the data must have a backup system that will provide all the needed information in case it goes missing.

8 0
3 years ago
If you were going to construct a table that only included shape names with number prefixes, which shape would you include
NikAS [45]
The answer would be A. square
3 0
4 years ago
Other questions:
  • If you're found to be at fault in _____, your driver license will be canceled within 90 days unless you complete a 12-hour Advan
    10·2 answers
  • You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should
    11·1 answer
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Output devices reproduce or display which of the following
    12·2 answers
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
  • Write a program that accepts three decimal numbers as input and outputs their sum.
    10·1 answer
  • I NEED INFORMATION ON THE WALT DISNEY VS. FADEN CASE ASAP<br> WILL GIVE BRAINLIEST
    8·2 answers
  • It displays the contents of the active cell. It allows you to enter and edit data, such as formulas.
    8·1 answer
  • Which appears at the intersection of a column and row?
    5·1 answer
  • You are the IT administrator for a small corporate network. The network uses a DHCP server for IP address configuration for most
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!