1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
10

COULD U ANSWER THIS ???

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
3 0

Answer:

B.lightning striking a tree

Explanation:

The crowd dispersing in all directions is not a closed-loop by any means, and students jogging around an oval track as well is not a closed-loop, and also not a cross country run from one point to another. However, the lightning striking a tree is a closed loop that best models a circuit. And as lightning strikes the tree, like a closed circuit, tree catches the fire, or in circuitry words, the current is generated, and tree catches the fire due to it, just like bulb starts glowing.

You might be interested in
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
Mandarinka [93]
The answer is Oligomorphic malware​.
7 0
3 years ago
Assume that a text box named PhoneNumberTextBox appears on a form and contains the phone number 414-555-5555. What value will di
Nitella [24]

Answer:

def PhoneNumberTextBox (integer):

         print(len(integer))

PhoneNumberTextBox ("414-555-5555")

Run the code and the length of the phone number text box will be 12.

Explanation:

The value for the length of the phone text box can be known using a programming language to decipher the length. For example let write a function to allow the computer get the length of the number with python.

def PhoneNumberTextBox (integer):

We write the function to accept an argument known as integer.

print(len(integer))

We print the length of the integer . The len function compute the length of the argument  written . The print function displays the length of the argument.

PhoneNumberTextBox ("414-555-5555")

We call the function and insert the integer in form of a string to get the length. when we run the function the length of the number is 12.

8 0
4 years ago
Antivirus is a program that detects error.True or False.​
Vaselesa [24]

Answer:  false

Explanation:

Because it isn't true.

5 0
3 years ago
Enterprise software is designed for organizations to __________.
klemol [59]

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

6 0
2 years ago
The ____ is the ranking executive on-site when the crisis or emergency arises, who is authorized to initiate the CM plan.
aleksklad [387]

The answer is the Executive-in charge

The concept of an Executive-in charge came from the military’s chain of command. A chain of command ranges from a supervisor to the top executive of the organization. When a crisis arises, it is possible that one or more of the senior top managers may not be available for consultations because of the travel-intensive positions.






7 0
3 years ago
Read 2 more answers
Other questions:
  • You have just deployed SNMPv3 in your environment. Your manager asks you to make sure that your SNMP agents can only talk to the
    13·2 answers
  • Assume that the population of Mexico is 128 million and that the population increases 1.01 percent annually. Assume that the pop
    7·1 answer
  • What are the main types of computer software?
    5·2 answers
  • Define a Python function named file_listers with two parameters. The first parameter will be a string specifying the name of the
    7·1 answer
  • What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes incl
    5·1 answer
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • While performing disk and file maintenance on the company file server, you determine a user in the accounting department has bee
    13·2 answers
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    7·2 answers
  • 6 → What is the difference between SHA-256 and SHA-512?
    12·1 answer
  • Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!