1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Soloha48 [4]
3 years ago
13

What are the basic kinds of matter called

Computers and Technology
2 answers:
agasfer [191]3 years ago
7 0
Solid liquid and gas
Stells [14]3 years ago
6 0
Solid. liquid. gas
Ice. Water. Water vapor.
You might be interested in
Which of the following is false about ERP II systems? Question 18 options: 1) They utilize the Web. 2) They include human resour
maks197457 [2]

Answer:

5) These ERP systems have no optional modules.

Explanation:

ERP II is a solution that comprises of the conventional materials planning, the distribution, and order-entry functionality reinforced by capabilities like consumer relationship management (CRM), the human resources management (HRM). A type of system like that can quickly, consistently and accurately operate the whole organization.

Some of the Examples of ERP system modules include: supply chain management (for example the manufacturing, purchasing and distribution of goods), product lifecycle management, warehouse management, customer relationship management (CRM), online sales, sales order processing, financials, human resources, and decision support scheme.

6 0
4 years ago
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
dezoksy [38]

Answer:

We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __Prime Curve_ over Zp.

Explanation:

Two families of elliptic curves are used in cryptographic applications

  1. Binary curves over GF(2m):
  2. Prime Curves over Zp.
4 0
3 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
What single awk command can be used to display all the login names and their associated numerical user IDs
Luden [163]

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

8 0
3 years ago
Microsoft word's spell checker
natka813 [3]
A, will also check word usage
7 0
3 years ago
Read 2 more answers
Other questions:
  • What happens when your computer is in Hibernate mode?
    12·1 answer
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
    11·1 answer
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
    13·1 answer
  • Examples of application software​
    7·2 answers
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • If you want the input gear to spin in the same direction as the output gear you must use a _______ gear.
    13·1 answer
  • Which term best describes these lines?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!