1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
3 years ago
9

A car can move, a crystal can grow, a fire alarm is sensitive and they are classified as non-living things. Explain?​

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
7 0

Answer:

They are all controlled by something else. A car is controlled by humans. A crystal grows due to the temperature and climate. A fire alarm only rings when it senses smoke, which is caused by something else, usually humans.

You might be interested in
At some point in your driving career, you will most likely be faced with an oncoming vehicle swerving into your travel lane. tru
aleksley [76]

I believe the answer is True.

7 0
4 years ago
Should people who download music and movies illegally be punished?
Mrrafil [7]
Opinion wise, I disagree with punishment. 
3 0
3 years ago
Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. A boolean variable named recalled has be
fenix001 [56]

Answer:

lknjokjbhib

Explanation:

jjbnikjjk jk  

8 0
3 years ago
What device did vladimir Zworykin use to develop television technology that resulted in the technology shifting from a mechanica
Viefleur [7K]
Zworykin invented a television transmitting and receiving system employing cathode ray tubes.
6 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Other questions:
  • You can undo up to the most recent 40 actions by clicking the undo button.
    9·1 answer
  • Which Tire would you use to explain a set of phones in an HTML document?
    12·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
    5·1 answer
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • What are the benefits of transferable skills check all the boxes that apply
    6·2 answers
  • Write a algorithm to attend birthday party​
    8·2 answers
  • Why operating system is important software for a computer give five reasons
    13·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Csf%20%7B%20%5Cfcolorbox%7Bgold%7D%7Bg%7D%7B%20Define%20malware%7D%7D%20" id="TexFormula1
    9·1 answer
  • 1. List three tabs that make up the Ribbon
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!