1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
5

How can a scientist safely tell whether an unknown solution is salt in water or sugar in water?

Computers and Technology
1 answer:
kaheart [24]3 years ago
7 0

Answer:

the answer is C

You might be interested in
Using a computer application is known as​
kondaur [170]

Answer:

A computer application is a program that runs on your computer.

Explanation:

7 0
2 years ago
You can install several printers on your machine, but at least one must be the _______ printer.
Digiron [165]
<span>You can install several printers on your machine, but at least one must be the default printer.
When you have several machines attached to your computer, it is important to designate one of them as the 'default' machines so as to avoid confusion within the system. If you fail to do this, you may create some problems, so be sure to choose a default one.</span>
3 0
3 years ago
Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
VMariaS [17]

Shoto Todoroki and Katsuki Bakugo

4 0
2 years ago
Read 2 more answers
Which task can a company perform with intranets
Irina-Kira [14]

Answer:

C.) store data securely would be my choice

Hope This Helps!  Have A Nice Day!!

6 0
3 years ago
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
2 years ago
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • Camera shock might happen if you do which of the following to your camera?
    6·2 answers
  • Which of these symbols is a special character that is accessible only from the Symbol dialog box? A. © B. + C. é D.
    13·2 answers
  • Which tab provide text formatting features
    11·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Media messages are communicated through which of the following:
    8·2 answers
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hir
    14·1 answer
  • All banks follow the same guideline for determining if an applicant qualifies for a loan.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!