1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
4 years ago
15

Is venus the largest second largest or third largest, smallest

Social Studies
2 answers:
Shalnov [3]4 years ago
7 0
Venus is the 6th largest planet, or the 3rd smallest (if you don't include pluto)
Gelneren [198K]4 years ago
4 0
Venus is the sixth largest and the third smallest 
You might be interested in
What makes a source credible
dolphi86 [110]

Answer:

Backed up evidence & no bias

Explanation:

A source is credible when backed up with with evidence and no bias whatsoever.

5 0
4 years ago
Read 2 more answers
I will give brainiest thank u must answer all of them
swat32

Answer:

Explanation:

End slavery

Second one

4 0
3 years ago
Based on the research cited in the text, during the first few years of marriage marital satisfaction: 1. goes up. 2. goes up unt
balu736 [363]
The answer is: 3 Drops.
After several years of marriage, the 'thrill' or 'passion' that make a person think they fell in love with one another tend to start to diminish.
This made them tend to reduce the effort that each couple made to court/impress each other, which lead to the drop in satisfaction.
6 0
3 years ago
How has invention of the hair dryer changed over time?
leonid [27]
At first , the hair dryer was a vaccum. the women noticed that it works to dry their hair, so they started using it. After, inventors started tweaking the vaccum into the hair dryer we all know. 
4 0
3 years ago
Read 2 more answers
A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device
d1i1m1o1n [39]

Answer: ICMP flood  attack

Explanation:

ICMP(Internet Control Message Protocol) flood is defined as the attack in which the target's IP(Internet protocol) address is known by attacker and then  continuous ICMP echo requests are sent in the form of ping to overload the targeted device.

This attack is also known as ping attack. ICMP attack results in Denial of service(DoS) risk and loads the network of devices with numerous data packets .

7 0
3 years ago
Other questions:
  • Which best describes a way people can use personal loans?
    13·2 answers
  • ______________ are a form of religious revival, whereas ______________ are a form of religious innovation.
    12·1 answer
  • A major obstacle to creating policies that address the issue of global warming is the conflict between
    5·1 answer
  • How are story elements and a story plot different?
    9·2 answers
  • True or false? The Salem witch trials in 1692 were trials for witchcraft in New England that were proven in a court of law
    7·1 answer
  • What factors would cause factories to leave the United States?
    11·1 answer
  • What does white blood cells do for the body
    9·1 answer
  • Why was the Interstate Commerce Act of 1887 significant?
    8·1 answer
  • Highlight 4 ways ethnicity could disrupt the peaceful life of a country​
    10·1 answer
  • structural intervention is best used when team members are willing to acknowledge the cultural differences and learn how to work
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!