1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
9

The chemical symbol H represents which of the following elements?

Computers and Technology
2 answers:
scZoUnD [109]3 years ago
4 0
The answer is D. Hydrogen
helium is He (just for extra knowledge)
melomori [17]3 years ago
3 0
The answer is D. Hydrogen.
You might be interested in
I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces s
Valentin [98]

Answer:

Contact the company to find out what the problem is.

Explanation:

3 0
3 years ago
Read 2 more answers
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organiza
mixas84 [53]

Based on  mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.

<h3>What is Joint Tactical Operations (JTO) Procedural Handbook?</h3>

This is known to be a book that contains all  the provisions that is needed by system operators along with some technical parameters and tactical procedures.

It is often used  for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.

Learn more about military from

brainly.com/question/525279

6 0
2 years ago
A linear representation of a hierarchical file directory is known as what?
MissTica
It is known as a directory path
5 0
3 years ago
Where would the following URL most likely send you: http://www.whitehouse.gov/about/tours-and-events?
dezoksy [38]

Answer:

To an official government website containing information relating to tours and events of the White House.

Explanation:

Hope this helps! :D

6 0
3 years ago
Other questions:
  • What are the differences between levels 1, 2 and 3 cache memoroes??
    8·1 answer
  • After a robbery, what is the purpose of conducting a neighborhood canvass?
    9·1 answer
  • 6 The part of the computer that contains the brain or central processing unit is also known as the ?
    11·1 answer
  • Anusha wants to use her computer,rather than handwriting the information on her notepad,to analyze her monthly expenses to make
    14·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Which image file format is the best format to use for photographs on the Web
    15·1 answer
  • Which item is not part of a college application
    11·1 answer
  • Cuando fue creada la aplicación Adobe Photoshop (creada, no lanzada)
    8·1 answer
  • How do we produce quality work in editing audio?
    7·1 answer
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!