1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
13

Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i

n a board game |-5| 2. the amount of improvement when increasing your grade by 7% |+7| 3. the change in height when climbing a 5-foot wall |+5| 4. the change of an account balance when spending $8 |-8| 5. the effect of eating five out of one dozen pears |+8| 6. the amount of change when the temperature rises from 5°C to 13°C |-7| i will mark brainlist
Computers and Technology
2 answers:
soldi70 [24.7K]3 years ago
4 0

Answer:

i don tunderstand the question

Explanation:

gulaghasi [49]3 years ago
4 0

Answer:

hi

Explanation:

You might be interested in
I will give brainliest !!
OverLord2011 [107]
Do these questions have given answers already?
3 0
3 years ago
1. A thesaurus is best used to _____________.
ira [324]
The answers:
1 <span>B. help find a word that means the same or a similar definition as another word
2 C. interesting
3 </span><span>B. organize thoughts and ideas
4 </span><span>D. editing or comparing two different documents</span>
7 0
3 years ago
A.Direction: identify the following examples of the ingredients used for sandwiches.
Orlov [11]

Answer:

i dont know how to answer may module because i dont have helper

8 0
2 years ago
_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
kap26 [50]

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

6 0
3 years ago
List five Types of computer
seraphim [82]

Answer:

  • supercomputer
  • mainframe computer
  • personal computer
  • minicomputer
  • work station

Explanation:

hope it helps you

8 0
2 years ago
Read 2 more answers
Other questions:
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • Although heart rate increases and decrease depending upon activity level on average a typical person heart rate is about _____ b
    10·1 answer
  • Create a file account.cpp containing a Bank Account Class.
    11·1 answer
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • . Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police r
    6·1 answer
  • What is your favourite video game??​
    5·2 answers
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • Industry experts estimate about what percentage of communication is through body language?
    11·2 answers
  • Some of y'all make me lose braincells with your questions
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!