1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
9

If your body were a house, your skeleton would be the house's ___________.

Computers and Technology
2 answers:
eimsori [14]3 years ago
4 0

It would be C. wooden frame.

Hope This Helps You!

frozen [14]3 years ago
3 0
I think the answer is c wooden frame
You might be interested in
You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.
elena-s [515]

Answer:

Authorization levels (privileges) need to be set for the users in the company.

Explanation:

Users need to be classified according to their departments and their position. Each group should see only <em>related</em> data, so their authorizations need to be done accordingly.

Also managers and staff should have different levels of reach to the data. Thus their privileges should set accordingly.

7 0
3 years ago
Read 2 more answers
This method of advertising is expensive but can be the most effective method.
egoroff_w [7]

<u>Answer:</u>

<em>Newspapers</em>

<u>Explanation:</u>

<em>The process of giving advertisement is one way to promote product. A product become famous only because of advertisement only. </em>

Business people spend lots of money in advertisements so that in turn it would give good returns. <em>It is not necessary that always advertisement has to be given for all the product</em>.

Mostly new products needs mobilization, next during festivals the dress <em>purchase will be heavy so people will get attracted towards it and buy in the shop which advertises, etc.</em>

8 0
3 years ago
What is the encryption cipher that was the precursor to des??
Elanso [62]
DES works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm.
8 0
3 years ago
SQL statement to verify the updated name field for the publisher with ID 5 SELECT * FROM Publisher WHERE PubID=5;
hichkok12 [17]

Answer:

Option(a) i.e "true" is the correct answer for the given question.

Explanation:

The select statement is used for fetching the record in the database. Select is the Data manipulation command. The given query gives  all the records where id=5 from the table publisher in the table format.After executing of query the user can verify that the field is updated or not in the table.

So the given statement is "true".

7 0
3 years ago
Which attribute defines the file name for the specific image in an image tag??
serg [7]
Src="/absolute/or/relative/path/to/image.file"
6 0
3 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • Write the importance of cyber law? In point .<br>​
    10·2 answers
  • What type of lights are necessary for silhouettes?
    12·2 answers
  • PLEASE HELPPPPPPP
    15·1 answer
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • 16. Which of the following wire gage sizes is the thickest? A. 14 B. 8 C. 0 D. -33
    14·1 answer
  • Fill in the blank with the correct response.
    5·2 answers
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!