1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
8

What are the two types of modern wind turbines?

Computers and Technology
1 answer:
gulaghasi [49]3 years ago
7 0
To be honest I'm not sure but I'd say B,C
You might be interested in
In most presentation software, custom animations are added from the _____. Insert menu Normal view Slide pane Task pane
gulaghasi [49]
The insert menu is what you'd use
4 0
3 years ago
Read 2 more answers
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
lozanna [386]
<span>A rootkit allows a hacker to gain privileged or 'root' access to a computer. A rootkit is designed to actively hide its presence so that the attacker can continue having full access for as long as they need to carry out their intended malicious actions without being detected.</span>
6 0
4 years ago
If Tracy is facing right, which of the following commands can be used to turn her to face up?
valentinak56 [21]

Answer: A. left (90)

6 0
3 years ago
How can you create balance to your drawing using only grayscale values?
Leokris [45]

use only fine pencils  

5 0
4 years ago
The mouse and keyboard are also sometimes called
likoan [24]
Hi!

The mouse and the keyboard are <em>input devices. </em>By using them, we can input data which will give us a (hopefully) desired output!

For example...

Just by using my keyboard to type, I'm inputting data in the form of ASCII characters and symbols.

By using my mouse to click on an area so I can move this sentence on a new line, I had to input a request to do such!

Hopefully, this helps! =)
7 0
4 years ago
Other questions:
  • The different between a compiler and a translaror
    9·2 answers
  • _____is empty space between the margin and text.
    8·1 answer
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • In Access, you use the Save As command to save a copy of your data. True or False
    15·1 answer
  • Who watches the show gravity falls, if you do, if you play the theme song for the first episode backwards you get a hiding messi
    11·2 answers
  • Which of the following is not an example of a cyber crime?
    8·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!