1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
3 years ago
13

Catherine took her camera to the repair shop. The technician at the shop told her that acid had leaked into her camera. What cou

ld be the possible reason for acid leaking into Catherine’s camera?
A. She used the camera even though the battery was almost empty.
B. She wiped the camera lens with a moist cloth.
C. She left the camera in harsh daylight.
D. She left fully discharged batteries in her camera.
Computers and Technology
1 answer:
tino4ka555 [31]3 years ago
3 0

Answer:

B

Explanation:

You might be interested in
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or perm
Sholpan [36]

Answer:

Piracy.

Explanation:

Piracy refers to copying or duplicating contents and then selling it to market at lower prices without the owners knowledge or permission. Let's assume I designed a software for company "A" at the price of $2500, but someone inside from the company created a copy of that software and sold it in market at price of $200 without my knowledge or permission. This is what we call piracy.

3 0
3 years ago
Can we change the format of a field (e.g. Number to Dollars).
mixer [17]

I think the answer is

3 - Usually, but we may need to convert the data types (date to text)

Because we can change the format, but depends of the original format type and in what type you need to format.

I think this can help.

3 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
You are an online training company and stream a lot of training videos from your
Yuri [45]

I think It would be have to be tovuti

5 0
3 years ago
Other questions:
  • How are devices connected to each other via Bluetooth? Choose two answers.
    11·1 answer
  • What are the advantages of homogenation
    5·1 answer
  • Write a program in C++ to implement bubblesort using the swap function ?
    11·1 answer
  • ________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
    10·1 answer
  • In this lab, 172.30.0.0 represents the __________ network and 10.20.1.0 represents the _________ network.
    11·1 answer
  • the mail merge feature can be used to address the same letter to several different people , true or false
    13·2 answers
  • How can a professional association help you reach your career goals?
    5·1 answer
  • Can someone that been helping me answer one more question for please and thx
    13·1 answer
  • A _____ is usually a smaller version of a data warehouse
    7·1 answer
  • Smart art can be used to create that highlight relationships between two items
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!