1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
5

which of the following statements about matter is true a.matter is anything that occupies space and possesses mass b.matter can

be composed of single elements c.matter can be combination of elements . d.all of the above
Computers and Technology
2 answers:
kvv77 [185]3 years ago
8 0
D.

Matter is everything
rodikova [14]3 years ago
5 0
I would have said A at first but after reading all the choices it's D
You might be interested in
From which os did windows xp evolve?
PSYCHO15rus [73]

Answer: Windows 2000

Explanation: I researched it and multiple sites said that it was Windows 2000.

<u><em>Hope this helps!!! :)</em></u>

7 0
1 year ago
When using a presentation software you can change the size of the text to...? Increase Font size, Decrease font size, increase t
ira [324]
Increase font size/ Decrease font size
7 0
3 years ago
Read 2 more answers
Besides your computer, where else can you find and use an operating system?
Vilka [71]

Answer:

Your phone.

Explanation:

Samsung is ran off of Android.

Apple is ran off of IOS.

Both are operating systems.

3 0
2 years ago
List one unprofessional AND one professional example of internet/social media
Leni [432]

Professional: Using social media to advertise a company you created

Unprofessional: Using social media to watch cat videos

4 0
2 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Other questions:
  • Explain why this scenario points towards a potential problem with BIOS.
    10·2 answers
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
    10·1 answer
  • What is difference between base font and font tags​
    13·1 answer
  • How many of these imformation have you shared​
    14·1 answer
  • When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res
    7·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!