1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
12

Choose three statements that compare the reactant and the products in the chemical reaction that forms elephant toothpaste.Athey

have the same total number of atoms.Bthey have a different total number of atoms.Cthey have different physical and chemical properties.Dthey have the same physical and chemical properties.Ethe chemical elements in the reactant and in the products are the same.Fthe chemical elements in the reactant are different from those in the
Computers and Technology
1 answer:
den301095 [7]3 years ago
7 0

Answer:

The answer is A

Explanation:

You might be interested in
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Which of the following is true about named ranges?
ohaa [14]

Answer:

Regarding a named range, the scope of a name is the location within which Excel recognizes the name without qualification. ... Once you name a range, you can change the size of the range using the Name Manager. True. You can create a new range by selecting the cells and typing a name in the Name box next to the formula bar ...

This is true about a range names. Hoped this helped a little. Im not sure which following you mean. maybe next time you can put a picture or descirbe it a little more or what the otions are.

I Hope You Have a Good Day or Night!! :)

Explanation:

5 0
3 years ago
What is the critical path?
Natali [406]

Answer:

Option C. The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

is the correct answer.

Explanation:

  • Critical path is the term used in Project management.
  • It can be known by determining the longest stretch for dependent activities and the time required for them to complete.
  • A method known as "critical path method" is used for Project modelling.
  • All types of projects including aerospace, software projects, engineering or plant maintenance need Critical method analysis for the modeling of project and estimation.

I hope it will help you!

3 0
4 years ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
Other questions:
  • If you need help with a topic that isn't present in English or math labs, what should you do?
    13·2 answers
  • Which programming language is good for 14 year old like me​
    12·2 answers
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2GB. The PC has an Intel C
    9·1 answer
  • Disk mirroring is a method of storing data that generates extra bits of data from existing data, allowing the system to create a
    14·1 answer
  • Write a program that takes a three digit number (input) and prints its ones, tens and hundreds digits on separate lines
    14·1 answer
  • PLEASE HELP QUICKLY, I WILL GIVE BRAINLIEST TO THE BEST ANSWER!
    9·1 answer
  • Please answer the following essay question:
    13·1 answer
  • Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​
    6·1 answer
  • Which option is designed by software engineers?
    9·1 answer
  • What is an example of new technology having a positive impact on sustainability?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!