1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
5

A measuring cylinder is used to measure the volume of an irregularsolid object.​

Computers and Technology
1 answer:
Gnesinka [82]3 years ago
6 0

Answer:

Yes it is used for measuring the volume of irregular solid objects for example a peice of stone, rubber etc.

Explanation:

You might be interested in
The batteries on electric vehicles are recharged using electricity from either a wall socket or dedicated charging unit.
yuradex [85]

Answer:

true

Explanation:

7 0
3 years ago
Which of the following are true about the PUSH instruction?
kkurt [141]

Answer:

Option A.

Explanation:

Only option A satisfies the definition of push statements. So it is only the correct option.

7 0
3 years ago
(01.01 LC)
zloy xaker [14]

Answer:

Create web and mobile applacations

Explanation:

6 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
4 years ago
1.How can we be a responsible online user???​
PSYCHO15rus [73]

Answer:

Be respectful – and expect respect.

Protect your reputation.

Protect your privacy.

Watch your tone.

Be sceptical.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The purpose of the ____________ element is to provide a method for a browser to display different images depending on specific c
    14·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • FTP is commonly used to __________ and __________ files to a server.
    12·1 answer
  • Write a function named change() that has an integer parameter and six integers reference parameters named hundreds, fifties, twe
    7·1 answer
  • The MAC address is a _____ bit number.
    10·2 answers
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), mod
    12·1 answer
  • What is MS-Word? Write some versions of MS-Word.
    8·2 answers
  • ¿por que hay peligros en internet?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!