1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
12

When storing used oil, it needs to be kept in ___________ containers.

Computers and Technology
1 answer:
tester [92]3 years ago
5 0

Answer:

Plastic container

Explanation:

because if we use iron it may rust and oil may also damage

You might be interested in
What is the mid-square method?
Rom4ik [11]

Explanation:

Mid-Square Method:-In this method some it takes some digits from the square of a number.This number is a random number.This number can be used as a key for hashing.

This technique is mostly used in hashing so decrease the collision in hash maps.

This method has  a limitation that when we square a large number it may go out of range of integer so we have handle those cases.

8 0
3 years ago
How do you code to find the surface area 6 s2, volume s3 in python
Nana76 [90]

Answer: you code to find the surface area 6 s2, volume s3 in python

Explanation:if you dont code the surface area 6 s2, volume s3 in python then you  cant code

4 0
3 years ago
Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c)
taurus [48]

Answer:

1. 3

2. D (Input Device)

3. B (File)

4. C (Microphone

7 0
2 years ago
List three considerations when you choose memory.
liq [111]
1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)
8 0
4 years ago
What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
kow [346]

2 + 3 + 4 = 9 so the value of result is also 9

8 0
3 years ago
Other questions:
  • A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
    10·1 answer
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • You tried to access an external html page, which can not be opened on the device for preview. open the page in dreamweaver to pr
    13·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an internally identifi
    6·1 answer
  • (1) Prompt the user to enter a string of their choosing. Output the string.
    11·1 answer
  • Meat and poultry exposed to some forms of radiations to extend shelf life. *
    8·1 answer
  • Is it possible to construct a wait-free n-thread PeekableStack(2) object from an arbitrary number of atomic Stack objects and at
    11·1 answer
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
  • A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!