1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
10

Which of the following technologies uses the results of a scientific discovery?

Computers and Technology
2 answers:
Lilit [14]3 years ago
5 0
Hello 

D) will be your answer.

HOPE THIS HELPED :)
belka [17]3 years ago
4 0
D. All of these
Reason being, they wouldn't have been made if something hasn't been discovered about them.

You might be interested in
What is a zener diode
V125BC [204]

a form of semiconductor diode in which at a critical reverse voltage a large reverse current can flow.
8 0
3 years ago
Define the term<br>cyber culture​
PolarNik [594]

Answer:

The social conditions brought about by the widespread use of computer networks for communication, entertainment, and business.

Hope This Helps!!!!

Explanation:

8 0
3 years ago
Advantages of special purpose computer
anzhelika [568]

Answer:

The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..

Explanation:

5 0
3 years ago
As u type where does excel display the entry
grigory [225]

Answer:

The Active cell inside Excel Worksheet is used to identify the cell which is currently active. The thick border gridlines around the cell indicates that it is the Active cell inside Excel Worksheet. The Active cell is where the focus is on and where the data will be entered when a key is typed on keyboard.

5 0
3 years ago
It is safe to tell an online acquaintance (someone you have never met in person) your
Anna [14]
It is safe to give out information that the other user can't use to track you. Generally, these include favorite music, favorite bans, hobbies.

It is never safe to give our personal and identifying information about yourself. This includes your full name (in most cases), place of residence, or any other contact information you may have - such as social media information.

D. Favorite music
7 0
3 years ago
Read 2 more answers
Other questions:
  • What could break the circuit between your home and an electric power plant?
    15·2 answers
  • Write a C# program named InchesToCentimeters that declares a named constant that holds the number of centimeters in an inch: 2.5
    14·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • How to follow accounts on brainy
    11·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim o
    6·1 answer
  • Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!