1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
12

How fast is light? person that answers this will get points ​

Computers and Technology
1 answer:
Serhud [2]3 years ago
6 0

299,792,458 metres per second

You might be interested in
What does an industry expect of you as an employee?<br><br> At least 3 please!
Hatshy [7]
Trusting, loyal, and a hard worker. All indristies want employees who won't backstab, works hard, and is loyal to the company
7 0
2 years ago
Read 2 more answers
A technician is dispatched to install additional RAM in a computer. The technician unplugs the system from the power source, and
xz_007 [3.2K]

Use an anti-static bag to hold the RAM while installing.

6 0
3 years ago
Which feature of spreadsheet software can display numerical data in a visually appealing and easily understood format
Bad White [126]
A table maker makes visually appealing tables such as line graphs, bar graphs, venn diagrams on a spreadsheet software. 
8 0
3 years ago
Read 2 more answers
The Danger zone around a robot is?
mojhsa [17]

maybe a EMP. tell me if im right

3 0
3 years ago
Read 2 more answers
Determine the type of plagiarism by clicking the appropriate radio button.
AleksAgata [21]

Answer:

a)

Explanation:

From the writing of the student, it shows that he plagiarized the work word for word, in that

1. There was the page number of the article in his writing

2. In addition, the reference shouldn't have been added at this stage of writing but the student did added it.

5 0
2 years ago
Other questions:
  • Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can c
    12·1 answer
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Who would use a CLI? (Command Line Interface)
    9·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • State the difference between = and ==
    9·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • ____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
    13·1 answer
  • Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the ca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!