1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
2 years ago
8

Does anyone know what anotmy means​

Computers and Technology
2 answers:
marissa [1.9K]2 years ago
6 0
“A study of the structure or internal workings of something.”

that’s the second half on the definition! Mark the other person brainliest though! I didn’t help much
deff fn [24]2 years ago
3 0

Answer:

also its spelled anatomy

Explanation:

The branch of science concerned with the bodily structure of humans, animals, and other living organisms, especially as revealed by dissection and the separation of parts.

Hope this helped :3

You might be interested in
This operating system was used by individual computers an required users to type commands
nika2105 [10]
Hey there!

The operating system that functions from typing commands is called a Command–Line–Based OS. Examples of this type of OS include UNIX and MS–DOS made by Microsoft. These features white or green text on a black screen and were primarily meant for professionals who had to learn lots of commands rather than everyday users. 

Hope this helped you out! :-)
7 0
2 years ago
Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the info
gizmo_the_mogwai [7]

Answer:

control processes.

Explanation:

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as executive/control processes.

3 0
3 years ago
What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More
babymother [125]

.A higher risk of financial data theftC

7 0
3 years ago
Read 2 more answers
Which type of approach grew out of the development of computers, where even complex behavior such as learning, remembering, cate
mestny [16]

Answer:

In studies of technology and innovation, it is common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology systems. Another distinction is between technology s hardware, software and orgware; sometimes socioware is added as yet another layer or category. In he studies, the focus is usually on a particular technology, either a process technology or product

Ž echnology with product technology broadly de In studies of technology and innovation, it is

common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology. Another distinction is between technology as hardware, software and orgware; sometimes socioware is added as yet another layer or category. In the studies, the focus is usually on a particular technology, either a process technology or product.  

Explanation:

7 0
3 years ago
The two types of one-time-password tokens are ______ and ______.
Nutka1998 [239]

Answer:

event based and time based

Explanation:

OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated

5 0
3 years ago
Read 2 more answers
Other questions:
  • In Microsoft Word you can access the _______ command from the "Mini toolbar".
    9·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • A hacker uses a valid IP address of an internal host, and then from an external system, the hacker attempts to establish a commu
    11·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • Write the header file Stadium.h for a Stadium class. The Stadium class has the following data members: 1) an array of 1000 Seat
    7·1 answer
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • What is a fire wall and how does it work
    6·1 answer
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • Question<br> 1. Who was the first to use an abacus
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!