1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
5

Which word goes with "meals

Computers and Technology
2 answers:
valentina_108 [34]3 years ago
7 0

Answer:

Food

Explanation:

Mkey [24]3 years ago
7 0

Answer:

I’d say food too.

Explanation:

You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Which technological tool is important for storing critical files?.
Vanyuwa [196]

The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.

<h3>Battery backup systems</h3>

A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.

In computation, there are three major classes of batteries systems:  Lead-Acid, Nickel-Cadmium, and Lithium-Ion.

An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.

Learn more about battery backup systems here:

brainly.com/question/7125266

3 0
2 years ago
Davids family took him to a hospital as he was suffering from a sericous ailment
marta [7]

Answer:

Here are some other sentences which always demonstrate that perhaps the hospital operates with either the help of technology, which is given below.

Explanation:

  • As eventually as he was acknowledged or confessed, the medical records of David would be documented by the medical practitioners.
  • David was therefore positioned through an ICU during which his heart rate had been monitored closely (those same types of machinery were directly linked to the desktops in position to obtain comment of his vital statistics.)
7 0
2 years ago
Write out code for a nested if statement that allows a user to enter in a product name, store the product into a variable called
OlgaM077 [116]

Answer:

product_name = input("Enter product name : ")

if product_name=="pen"or"book"or"box"or"pencil"or"eraser":

   if product_name == "pen":  

       amount = 10

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "book":

       amount = 100

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "box":  

       amount = 150

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "pencil":  

       amount = 5

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "eraser":

       amount = 8

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

else:  

   print("Item not found!")

Explanation:

The python program is a code of nested if-statements that compares the input string to five items of the first if-statement. For every item found, its code block is executed.

6 0
3 years ago
The ip address 172.16.80.125 is written in binary notation as:
trasher [3.6K]
10101100.00101001000
8 0
3 years ago
Other questions:
  • Which type of software-generated problems can indicate that a software bug is causing a memory error?
    11·1 answer
  • What is the decimal equivalent of (11000 + 10000)/101?
    10·1 answer
  • 4. Who developed the first design technology program which had a
    12·1 answer
  • Which of these statements describes the difference between binary and decimal numbers?
    11·2 answers
  • How to cancel branly subscription??​
    8·1 answer
  • How do users log into Windows 8?
    7·1 answer
  • PLS HELP ILL GIVE BRAINLY- (enter the answer) Microsoft _________ is an example of a desktop publishing software
    13·2 answers
  • The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve
    8·1 answer
  • What is the Is option that prints the author of a file​
    7·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!