1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
15

What labels could you add to the model to describe competition of the different space objects shown?

Social Studies
2 answers:
ale4655 [162]3 years ago
8 0

Answer:

Planets,Solar system

Explanation:

Dum Noob

nikdorinn [45]3 years ago
6 0
Planets, solar system hope this helps :)
You might be interested in
The meaning of glanced over​
vodomira [7]

Explanation:

examine hastily; "She scanned the newspaper headlines while waiting for the taxi"

4 0
3 years ago
Read 2 more answers
What is domestic tranquillity and why were the authors of the constitution concerned about this
SpyIntel [72]
Domestic tranquility is basically the people being happy with the country and not being in danger. They were concerned about it because without it, it could lead to revolts and revolutions.
3 0
3 years ago
WXYZ is a parallelogram. Name an angle congruent to XYZ​
frez [133]

Answer:

ZWX or XWZ

Explanation:

This is because the opposite interior angles are congruent and the opposite of the middle of the angle (Y) so W will be in the middle and you dont use Y

4 0
3 years ago
List and detail at least two ways someone may be unethically using a device or a network.
Sveta_85 [38]

The ways that someone may be unethically using a device or a network include:

  • Identity Theft.
  • Financial Theft

<h3>What are some unethical uses of technology?</h3>

It should be noted that the most common unethical uses of a drive or network identified are personal web surfing or shopping, as well as using company email for personal reasons and playing computer games at work, etc.

Also, the unethical ways include both identity and financial theft. Also, the unethical use of computers can be defined as downloading songs, movies, software and etc from the internet illegally.

This also includes the violation of copyright. Therefore, it's important for people to always safeguardsl and keep password in order to avoid the unauthorized access but other people.

This is important to prevent identity theft, financial fraud and theft.

Learn more about ethics on:

brainly.com/question/13969108

#SPJ1

5 0
2 years ago
THIS<br>Disorder is to chaos as interest is to​
fredd [130]

Answer:

Curiosity

Explanation:

i think

6 0
3 years ago
Other questions:
  • When a water fountain is installed in a building at a height that can be accessed by persons of all ages, including those who ma
    5·1 answer
  • How did Muslim Turks influence Turkey’s development?
    10·2 answers
  • A third-party program, such as adobe flash player, is considered to be a(n) ________.
    5·1 answer
  • What were the Nuremberg Laws? Who did they target and how? List 3 ways people were targeted by the Nazis.
    5·1 answer
  • A man who passed the civil service examinations were known as __________________, qualified for government jobs. which one
    9·1 answer
  • What was the most powerful, destructive force in 1814?
    5·1 answer
  • Make a timeline from 1958- 1910 to show social and politics development in the subcontinent​
    14·1 answer
  • The principle of ethical behavior in the AICPA Code that asks questions directly related to ethical courage is: Group of answer
    11·1 answer
  • Please help I'll mark brainliest
    12·1 answer
  • The annual "Sacred Run's" path
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!