1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
5

If nothings faster than light then how do the dark get there first????

Computers and Technology
2 answers:
Nadya [2.5K]3 years ago
3 0
Idk magic???? if thats not correct i dont know what is
irina [24]3 years ago
3 0
Darkness only happens because of the lack of light. For instance, when it's nighttime the only reason it's dark is because there is not enough light to create, well, light.<span />
You might be interested in
Michael works for a graphic design firm. He is creating an informative poster. He needs to add a great deal of text in the poste
Dennis_Churaev [7]

Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

<h3>What application is used for graphic design?</h3>

They are:

  • Adobe Photoshop
  • Illustrator, GIMP
  • CorelDraw
  • Canva  and others

Based on the American Institute of Graphic Arts (AIGA), graphic design is known to be a term that is described as “the art and method of planning and bringing forth ideas and experiences along with the use of visual and textual content.”

Therefore, Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

Learn more about graphic design from

brainly.com/question/27019704

#SPJ1

3 0
2 years ago
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
3 years ago
Read 2 more answers
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
you are troubleshooting an inkjet printer . users report that the printer is printing in the wrong colors. the problem just star
monitta

The likely cause of the printer printing in the wrong colors includes:

  • Ink cartridges installed in the wrong spot
  • leaking ink cartridges

<h3>What is a inkjet printer?</h3>

This refers to a computer peripheral that produces hard copies of a text document or photo by spraying droplets of ink onto paper.

In conclusion, the likely cause of the printer printing in the wrong colors includes ink cartridges installed in the wrong spot and leaking ink cartridges.

Read more about inkjet printer

brainly.com/question/4962501

#SPJ4

6 0
2 years ago
Select the correct answer from the drop-down menu.
AnnyKZ [126]

you can right click the target cell or cells and then select the keys to paste the copled data.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is a Limited Purpose credit card
    11·2 answers
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    6·2 answers
  • Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
    5·2 answers
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • In an array-based implementation of a dictionary, if you represent the entries as an array of objects that encapsulate each sear
    12·1 answer
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • How has music changed with the use of technology?
    14·1 answer
  • Select the correct answer. Which input device uses optical technology?
    5·1 answer
  • 4. Ernesto works in a small office with five other people. What are two possible connection
    8·1 answer
  • If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!