1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
8

What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist

C) evidence of volcanic activity D) evidence of volcanic activity
Computers and Technology
2 answers:
Volgvan3 years ago
4 0

Answer:

the answer is  a)

Explanation:

Alex787 [66]3 years ago
3 0

Answer:

the answer is a

Explanation:

You might be interested in
IMPORTANT HELP
balu736 [363]

Answer:

plz am so sorry I don't no it

Explanation:

Plz give me brainiest

6 0
3 years ago
This question is related to linked-list representation of disjoint sets. Consider two sets Sx and Sy that have 3 and 5 elements,
sattari [20]

Answer:

A union (UNION(x,y)) of the sets Sx and Sy represented by x and y, respectively will perform ________4_________ update(s) of the attribute.

Explanation:

The UNION (x, y) disjoint-set data structure unites the dynamic sets that contain x and y, say Sx and Sy, into a new set.  It is called the union of the two sets. Before the union operation, the two sets are disjoint.  After the union operation, the representative of the resulting set is some member of Sx and Sy or either Sx or Sy. The sets Sx and Sy are then destroyed to remove them from the union collection S.  So, four operations are required.

8 0
3 years ago
An associate is seeking advice on which device to purchase for a friend who is a business owner. The friend needs the ability to
spayn [35]

The best recommendation in the mentioned scenario would be a smart watch.

Answer: Option A.

Explanation:

The best device for a business owner who needs an access to chat as well as to be in touch with the home office would be a smart watch. A smart watch is similar to a mobile device, which is worn on a wrist and which has a touchscreen display.

The benefits of smart watch are numerous. It makes us updated about everything without using our smartphone. The smart watch will help the business owner to engage with others and to handle his work at the same time.

5 0
3 years ago
What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
valentina_108 [34]

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

6 0
3 years ago
Read 2 more answers
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
Other questions:
  • Automotive engine cylinder heads can be made of what?
    7·1 answer
  • Which type of cell references are locked and NOT automatically updated when it’s copied
    8·1 answer
  • Create a program the outputs the total cost of a lunch order. Users should be prompted to input the number of hamburgers, fries,
    6·1 answer
  • What are 6 external parts or perpherals of a computer system and identify output from input devices.
    12·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
    8·1 answer
  • Have y’all enjoyed The new hero floryn from Mobile legends
    6·1 answer
  • Which types of attacks are thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and spe
    15·1 answer
  • missy just hired a software development team to create an educational simulation app for a high school course. she has specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!