1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
5

Who lives in a pineapple under the sea?

Computers and Technology
2 answers:
Jlenok [28]3 years ago
8 0

Answer:

Spongebob Squarepants

Explanation:

VashaNatasha [74]3 years ago
4 0

Answer:

CCCCCC

Explanation:

You might be interested in
What environmental hazards exist because of man’s desire for profit?
Anastasy [175]
Cutting down trees for paper
5 0
3 years ago
Read 2 more answers
What are the steps involved in accepting all the changes in a document?
Makovka662 [10]

To accept all the changes in a document click Accept All.

4 0
3 years ago
Read 2 more answers
How do nations mostly use technology in foreign relations? Check all that apply.
Andreas93 [3]

Answer:

  • to spy on one another
  • to carry out cyber attacks
  • to improve their public images

Explanation:

Different countries have tools to hack, control and filter information in foreign countries using different devices and techniques that allow them to be aware of any threat that may arise from another country, as well as obtaining information that helps them.

By linking technology with foreign policy, it is possible to strengthen and complement national capacities in these areas, opening the possibility of diversifying and expanding the projection of a country with an excellent image that offers sophisticated technology-based services.

5 0
3 years ago
true or false if you type too much text on a powerpoint slide, the additional text is added to a second slide
Nady [450]
True I've had it happen alot
3 0
3 years ago
Read 2 more answers
Question # 9
Ganezh [65]

Answer:

flight stimulators are used to train astronaut and design simple air craft

8 0
2 years ago
Other questions:
  • The linux and macos program traceroute is known by a slightly different name on windows. it's referred to as ______.
    5·1 answer
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • How many frequencies does a full-duplex qam-64 modem use?
    8·2 answers
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • The site is not allowing me to purchase the subscription. Please help?
    12·1 answer
  • The following is a sequence of undo-log records written by two transactions T and U: < START T>; ; < START U>; ; ; ;
    8·1 answer
  • Given the statement: int list[25]; The index can go from 0 to 25 inclusive withoutgoing beyond the end of the array.true or fals
    14·1 answer
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!