1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
11

The color pattern in which marine organisms are light on the bottom and dark on the top of their bodies camouflaging them agains

t the water-air interface is ________.
Computers and Technology
1 answer:
suter [353]3 years ago
4 0

Answer: countershading

Explanation:

This is a type of protective camouflaging used by marine organism whereby they are light at the bottom and dark on top.

They have got receptors in their body which help helps them to camouflage their upper and lower half body using a distinctive colour pattern.

You might be interested in
Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she wil
Rzqust [24]

Answer:

More space

Pen drives generally have more storage capacity than CDs with CDs usually having just around 700 Megabytes for storage. Pen drives on the other hand can reach up to 2 Terabytes of data storage capacity. If the file she needs to save is high, Elsa should use the pen drive.

Scratch resistant

CDs can be scratched on the way to the house and lose some data or make it harder to extract. Pen drives do not have such problems are they are encased in an outer casing.

Portable and Accessible.

Pen drives are easy to carry which makes them portable and they are easier to use because a lot of computers do not have a CD drive but every computer has a port for a pen drive therefore making data in pen drives more accessible.

4 0
3 years ago
Importance of project risk management
kkurt [141]
You must spread your risks out like don’t put all your eggs in one basket... don’t rely on on thing because is it goes downhill you have no backup
5 0
3 years ago
What provides access to the internet?
Sphinxa [80]
A router!
12345678901234567890
6 0
3 years ago
How do headphones work? (From pc)
____ [38]
<span>Large headphones are essentially just two loudspeakers mounted on a strap that clamps firmly over your head. Earbuds work the same way but, as you would expect, everything inside them (the magnet, the coil of wire, and the diaphragm cone that makes sound) is shrunk down to a much smaller size.</span>
5 0
3 years ago
Software that function as an electronic file cabinet
Airida [17]

Answer:

The answer to this question is "Document management software".

Explanation:

Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.

  • This software controls many fields, that are Storage location, Security and access control, Version control, etc.
  • It is a common component, that is found in an Enterprise Content Management environment, that uses this software.

7 0
3 years ago
Other questions:
  • What device brocasts all data packets to other nodes on a network?
    5·1 answer
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • Juliet is trying to increase her savings account and she decides that she is going save an additional $700 every month. If her m
    9·1 answer
  • What do you think about the future of computers?​
    14·1 answer
  • Write a method that determines the total number of chars in each string of an array.
    12·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
    8·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Password ____ traverse the network searching for passwords from remote authentication systems.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!