1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
4 years ago
5

Which ammunition security category includes fragmentation grenades mines and explosives?

Computers and Technology
1 answer:
katrin [286]4 years ago
8 0
Weapnons and defense. Or building and crafting.
You might be interested in
A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the prin
ki77a [65]

Verify the USB cable is attached

Answer: Option A.

<u>Explanation:</u>

The USB cable utilized for printers is known as a USB AB cable, named for the attachments on each end. The USB-An end is a level, rectangular fitting; the USB-B end is a square attachment with two bended edges, which goes into the printer.

A USB link associates your printer to your PC, so you have an immediate association each time you print. Most of printers are good with a USB 2.0 A/B link. This is a standard link that is generally accessible and it can likewise be utilized to interface a few mice and cameras to your PC as well.

7 0
3 years ago
Which type of application architecture has a logic tier
LuckyWell [14K]

Answer:

hi

Explanation:

7 0
3 years ago
Read 2 more answers
7.2 code practice edhesive. I need help!!
GaryK [48]

Answer:

It already looks right so I don't know why it's not working but try it this way?

Explanation:

def ilovepython():

    for i in range(1, 4):

         print("I love Python")

ilovepython()

6 0
3 years ago
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:
vodka [1.7K]
The answer is Cybercrime.  <span>The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  </span><span>Common types of </span>cybercrime<span> involve hacking, online scams and fraud, identity theft, etc.</span>
7 0
4 years ago
Someone please help ASAP will brainlist
Arada [10]

Answer:

i cant help

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Crowdsourcing is:
    5·1 answer
  • after turning the volume all the way up on the speakers, you still cannot hear any sound. which of the following should be your
    9·1 answer
  • 2. Design a class named Sandwich with data fields for description and price. Include a constructor that requires arguments for b
    14·1 answer
  • What does technological convergence mean, with examples?
    10·1 answer
  • Which step is common to both creating a new document and saving a document?
    11·2 answers
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
    6·1 answer
  • Pls give me some suggestion of good Computer Science reference books for XI CBSE. <br> PLS!!
    10·2 answers
  • What is word length in computer​
    10·2 answers
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • 2.3 Code Practice: Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!