1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
3 years ago
9

Is 5g harmful to the body ?

Computers and Technology
2 answers:
Vera_Pavlovna [14]3 years ago
5 0

Answer:

yes, because of radiation

Oduvanchick [21]3 years ago
5 0
Yes , because of radiation
You might be interested in
How do mark somebody as brainliest??
svet-max [94.6K]

Answer:

Once more that one person answer, you will get an option next to the heart and the star that would look like a crown

Explanation:

That is how you do it.

4 0
2 years ago
Which of the following questions will most likely be answered by displaying data on a line graph?
Artemon [7]
I'm pretty sure the answer is b
4 0
3 years ago
The ease of travel in the twentieth century played a role in the advancement of medicine. Based on this lesson, which statement
Shtirlitz [24]
During the twentieth century, transportation had been very significant and played a great influence in the advancement of medicine. This is because this made health care become more accessible to patients no matter where they are located. The answer for this would be option C.
8 0
3 years ago
Read 2 more answers
The database structure in a dbms is stored as a _____.
Colt1911 [192]
This will be stored as a collection of files
6 0
2 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
Other questions:
  • Launched in 1995, ________ has become the most popular web browser.
    6·1 answer
  • A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.
    13·1 answer
  • Read an integer from keyboard and then print the result of the sum obtained by adding the entered integer to the integer formed
    11·1 answer
  • An application needs to calculate sales tax for purchases. You decide to simplify the code by putting the sales tax calculation
    9·1 answer
  • The ____ is a tool in versions of microsoft office starting with office 2007 that consists of tabs, which contain groups of rela
    7·1 answer
  • Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info
    13·1 answer
  • What is the advantages and disadvantages of hardware devices and software devices ?
    9·1 answer
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • 2. As a student (now or in college) name a way you can use Excel. How can that help you as a student?
    5·1 answer
  • What is a document you can create with word-processing software
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!