1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
5

Waterpower was first harvested by ancient societies using

Computers and Technology
1 answer:
Maslowich3 years ago
6 0
Not sure why this question is in Computers and Technology...

Answer should be c.
You might be interested in
How many arguments are required for the sum function?
podryga [215]
Provide us with this "sum" function, and we can tell you. We aren't psychic.
7 0
3 years ago
You would like to put the data in order by product number. What should you do?
Dafna11 [192]

If someone wants to put data in order (ascending or descending) they should sort the data.

c. Sort

<u>Explanation:</u>

Sorting is the process of arranging the data on the basis of some property or attribute. Using the find command, conducting a query, and mapping the data would not help.

There are various sorting algorithms like the bubble sort, selection sort, insertion sort, quick sort, and merge sort. Out of all the attributes, one or a combination of attributes can be selected to serve as the basis for sorting.

8 0
2 years ago
Sue follows these steps to create a chart in her presentation.
aivan3 [116]

Answer:

A chart with sample values

5 0
3 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
HELP PLS PLS PLS BRAINLIEST HELP ME CASSANDRA is shooting a photo series in very low light. What kind of lens opening will
blsea [12.9K]

Answer:

large lens opening

Explanation:

4 0
2 years ago
Other questions:
  • Using Python
    14·1 answer
  • 2. Fabulously Fit offers memberships for
    9·1 answer
  • Describe how computer is in the last 35 years
    6·1 answer
  • Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees.
    13·1 answer
  • Given :an int variable k,an int array currentMembers that has been declared and initialized ,an int variable nMembers that conta
    12·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Can an iphone user see when an android user is typing
    10·2 answers
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Please help it would mean to world to me❤️ (WORD)
    13·1 answer
  • Does anyone know how to change your username? plz help I don't want my name on this lmo
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!