1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
13

What are scientific theories and laws developed

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
8 0

Answer:

In general, a scientific law is the description of an observed phenomenon. It doesn't explain why the phenomenon exists or what causes it. The explanation of a phenomenon is called a scientific theory. It is a misconception that theories turn into laws with enough research.

Explanation:

You might be interested in
Which of the following is a command shell with a built-in scripting language?1. The Server Manager’s Roles and Features wizard2.
IgorLugansk [536]
Your kinda right but wrong
4 0
3 years ago
Read 2 more answers
What is a data source in OLE?​
babunello [35]

Answer:

OLE DB Driver for SQL Server uses the term data source for the set of OLE DB interfaces used to establish a link to a data store, such as SQL Server. Creating an instance of the data source object of the provider is the first task of an OLE DB Driver for SQL Server consumer.

Explanation:

hope it helps you and give me a brainliest

6 0
1 year ago
Which of the following tasks is the project manager least likely to be involved in?
user100 [1]

Answer:

i think its d sorry if i am wrong

3 0
3 years ago
Read 2 more answers
Is discord down right now?
Eva8 [605]

Answer:

yes it is

Explanation:

To do this, visit discord.com and login to the web version. Once logged in using the right credentials launch the app on your PC, discord should work properly now. Ensure the system is up to date. As a last resort, uninstall and reinstall the app again.

3 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Other questions:
  • Who would like to join a team devoted to decreasing spam and bullying?
    5·1 answer
  • List the steps that you need to locate Microsoft Word on your computer
    7·1 answer
  • The process of adding a header to the data inherited from the layer above is called what option below
    8·1 answer
  • Which of the following is an example of data an Earth-observing satellite would collect?
    7·1 answer
  • Que significa el término “Informática”?
    11·1 answer
  • What can be done to solve unemployment problem?​
    11·1 answer
  • I don't know what to do for these two questions
    13·1 answer
  • What does an arrow after a command indicate
    13·2 answers
  • A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps
    6·1 answer
  • Memorex Disks sells computer disk drives with right-of-return privileges. Returns are material and reasonably predictable. Memor
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!