1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
11

During which part of geologic time were dinosaurs most common?

Computers and Technology
2 answers:
ANTONII [103]3 years ago
6 0
The answer is C. Jurassic.
Flura [38]3 years ago
6 0
Its c.jurassic perhaps..sorry if it is wrong
You might be interested in
Identify 5 internal and external hardware components of a server
UNO [17]

Answer:

Internal:

#CPU; That retrieves &execute instructions.

#Modem; Modulates& demodulates electric signals.

#RAM;Gives application a place to store &access data on a short time periods.

External:

#Mouse; Transmits commands and controlling movements.

#Moniter; Device used to display video output from computer.

#Printer; Accepts text, graphics to the paper.

Explanation:

Hope this will help you.

5 0
3 years ago
The ___ of a worksheet defines its appearance
Arte-miy333 [17]
The page setup of a worksheet defines its appearance. In page setup there are also many things like what font we are using, margins, number of cells etc.
Worksheets are used to enter, calculate and analyze data in numbers and text, and a collection of worksheets is known as workbook. we can create worksheets in Microsoft Excel.

<span> </span>

4 0
3 years ago
What are web services?
nekit [7.7K]

So far the most general and convincing definition is to say that Web Services are the set of applications or technologies with the ability to interoperate on the Web. These technologies exchange data between them in order to offer services.


7 0
3 years ago
Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or dark
ratelena [41]
Turn the brightness up
7 0
2 years ago
Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
ad-work [718]
The ipsec component software that handles the tasks of encrypting, authenticating, decrypting, and checking packets is called IKE.  It is short for Internet Key Exchange.  It is <span>a network security Protocol aimed to allow two devices to actively exchange Encryption Keys and negotiate Security Associations </span>
8 0
3 years ago
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.
    7·1 answer
  • Describe the role of the microprocessor in an automatic washing<br> machine (IGCSE)
    10·1 answer
  • To execute a prepared SQL statement, you can use the ________________ and execute() methods of the PDOStatement object to set pa
    10·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • What do Business Analysis workers do? Check all that apply.
    15·2 answers
  • What is the value of |-10|
    6·1 answer
  • Which of the following described a global network connecting billions of computers and other
    10·2 answers
  • Choose 2 statements that correctly describe the time complexity of data structures with N data.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!