1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
10

Mengapakah wanita hamil memerlukan jumlah nutrien yang lebih banyak berbanding wanita tidak hamil.

Computers and Technology
1 answer:
Elan Coil [88]3 years ago
5 0

Answer:

Because of the baby in the womb

Explanation:

Remember, a pregnant woman carries a life (the fetus) in her womb, and the unborn child depends on its mother for food. Such a complex and fascinating stage of pregnancy requires the mother to be well-nourished or else the child may die or suffer some health problems; which may even affect the mother.

You might be interested in
Roles of computer in business areas​
snow_lady [41]

Explanation:

The use of computer in business field is increasing day by day. Computers have been heart of modern business. In business, computer help in several kinds...of work such as to keep the records of goods of employees, measure the quantity of goods, send e-maila, communicate with the customers, give online services to customers, control the branch offices from the main offices, and so on....

4 0
2 years ago
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
In the software development process, which review studies the software design before it is released for coding?
marta [7]

1. In the software development process, the <u>software requirement</u> review studies the software design before it is released for coding.

2. <u>Audits</u> and walkthroughs are additional types of reviews performed in the software development process.

<h3>What is software development?</h3>

Software development can be defined as a process through which a software application (program) that is used to perform specific tasks on a computer is conceived, designed, developed (programmed), documented, tested and reviewed.

<h3>What is a software review?</h3>

A software review refers to a process that involves the analysis and examination of a software application (program) by a software developer, computers (robots), project personnel, end users, or user representatives for comment or approval on specifications and standards.

<h3>Types of reviews in software design.</h3>

In the software development process, there are three (3) main types of reviews and these include the following:

  • Preliminary design review (PDR)
  • Critical design review (CDR)
  • Software requirements review (SRR)

Furthermore, the additional types of reviews performed in the software development process are:

  1. Inspection
  2. Code review
  3. Technical review
  4. Pair programming
  5. Audit review

Read more on software development here: brainly.com/question/25760458

8 0
3 years ago
I need the answer to life. I cant live without my POGCHAMPS!
Ilya [14]

Answer:

Pray to God and ask him for help in life. May God bless you

Explanation:

8 0
3 years ago
Read 2 more answers
WHAT DOES THE TRANSPORT LAYER USE TO MAKE SURE THAT A MESSAGE IS REASSWMBLED CORRECTLY ON THE RECEIVING DEVICES?
mrs_skeptik [129]
The answer is  sequence  number
6 0
3 years ago
Other questions:
  • Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe
    14·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Use the SQL Server Management Studio to complete the following.
    9·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • horseback riders, bicyclists, and skateboarders ____ the rules of right-of-way when they use the road ?
    7·2 answers
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • What is the CSS property used to style text as all lowercase or uppercase?
    14·2 answers
  • Why 3 phase motors so effective?
    5·1 answer
  • When you use the 3 bits 100 what color will it produce?<br><br> Computer Science
    11·1 answer
  • Assert statements are a tool programmers employ to help them debug their code more efficiently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!