1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
5

What makes iron man different from other superheroes ? why is iron man the best superhero ??

Computers and Technology
2 answers:
dalvyx [7]3 years ago
4 0

Answer:

so I beg to differ that he is the BEST hero, cause really they all have different abilities, you can't really compare Iron mans beams to Thors' lightning or hulks strength, but what makes him different is that he works for his powers, he used his smarts to build a super suit, although sure, anyone can do that, but he kind of represents Spider mans Uncle Ben in this case because of the phrase "With great power, comes great responsibility"  and Tony used his great intellect to make his super suit, ya know?

Soloha48 [4]3 years ago
3 0
He's rich, smart, and cares about others. Also he tries to fix problems before they become bigger and dangerous.
You might be interested in
A common and extremely useful feature of most online dictionaries is
choli [55]
A common and extremely useful feature of most online dictionaries is <em />interoperable browser.
4 0
3 years ago
A main reason careers in Information Technology are growing faster than average is
Scorpion4ik [409]
Technology has become such a major part of everyday life
8 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
2 years ago
What is the one common feature that ties together different social media technologies
Mazyrski [523]
They have the key feature of communication.
All social media encourage us to interact with others, be it with family, friends, known or unknown people.
3 0
3 years ago
A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user
Ira Lisetskai [31]

Answer:

Option A and Option E are correct.

Explanation:

A user informed the call center to complain that their office's laser printer damages every paper while it is printed. The user well into the distribution tray reviewed those papers although it's glossy and wrinkle-free.

So the purpose behind it is that the paper doesn't reach the printer's specifications, or even when going thru the printer, the paper becomes moist.

8 0
3 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
    11·1 answer
  • If a company's IS-related programs are not developed in-house, then the development group of the IS department will be staffed p
    6·1 answer
  • Select each of the strategies you can use to be more efficient when using the Internet. using tabs creating tables creating book
    6·2 answers
  • Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following m
    10·1 answer
  • Brainly is brainly am I correct ​
    11·2 answers
  • Photo editing software, desktop publishing, email and word processing software is most likely to be used by:
    12·1 answer
  • Comment if u wanna text me on behance
    6·1 answer
  • Which type of inventory control is expensive but helps keep inventory especially secure? A. RFID tags B. Barcodes C. Visual merc
    7·1 answer
  • How are the waterfall and agile methods of software development similar?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!