1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
5

What material replaced stone as the primary materials used to make tools and machines by humans

Computers and Technology
1 answer:
swat323 years ago
4 0

steel is pretty common, if not metal

You might be interested in
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
3 years ago
What is the full form of Computer?<br>​
algol13

Answer:

Computer is just made up of hardware and software components.

Explanation:

Sorry if I didn't get your question well

7 0
2 years ago
Think of the silliest problem the problem solving process could help with.
arlik [135]

Answer:

if 4 slinkies were put down a set of stairs at different times but reached the bottom at the same time. whats the difference?          

Explanation:

5 0
2 years ago
Read 2 more answers
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
_____ is the process of bypassing the built-in limitations and protections of a mobile device. Group of answer choices D. Slicin
katrin2010 [14]

Answer:

C

Explanation:

Jailbreaking is the process of bypassing the built-in limitations and protections of a mobile device

7 0
2 years ago
Other questions:
  • What is an example of asynchronous communication
    7·1 answer
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • Which of the following is a job description for a person with a degree in information technology
    15·1 answer
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For ma
    10·1 answer
  • Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
    7·1 answer
  • CAN SOMEONE PLEASE HELP ME OUT I REALLY NEED THE ANSWER!
    14·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
  • Why does the media play such an important role in our personal freedom? Select 3 options.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!