1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
15

What are tributaries

Computers and Technology
2 answers:
sukhopar [10]3 years ago
5 0
Tributaries are rivers that flow into another river or another lake. Tributaries are common in any country. Tributaries are like roots of lakes that flows to somewhere else. It is like a distribution of water that scatters through streams and lands to a larger body of water.
Nuetrik [128]3 years ago
4 0

I'm sorry I just took this test and I put  ( Rivers that flow into lakes ) it was wrong.

You might be interested in
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
What is one purpose of an algorithm
adelina 88 [10]

Answer:

Algorithms is formula for solving a problem. It is helpful because it specifically give instructions detail to computer to what a computer should perform a specific task.

For e.g. calculating report cards.

4 0
3 years ago
Any Body have a zoom class goin on<br> i wanna bomb
Norma-Jean [14]

This site is only for education related questions. You should only answer or ask questions. That's what we are here for. Whoever is reading this answer, please spread it to stop people from zooming, hurting others, or just posting non-related to education questions. Thank you.

6 0
2 years ago
Give the an example of the following .<br>a.)typing software<br>​
IceJOKER [234]
Max Type Pro

Stamina Typing Tutor.
3 0
3 years ago
Read 2 more answers
If your computer is running slowly, which of the following is most likely to solve the problem?
sleet_krkn [62]

Answer:

Purchase Anti-virus

Explanation:

Delete old files.

clear your temp

update to a ssd

8 0
3 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • What is the recommended size for bulleted text? 12–22 24–40 44–66 54–80
    10·1 answer
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • Which of the following is true of the Internet as a medium for branding? a) The Internet is more effective as a media for brandi
    10·1 answer
  • The item in this illustration that is highlighted is _____.
    11·2 answers
  • Which blog had legal content and is written mostly by lawyers
    14·2 answers
  • How does inertia affect a person who is not wearing a seatbelt during a collision
    8·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!