1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
10

What is the aperture of the human eye and why

Computers and Technology
1 answer:
AveGali [126]3 years ago
7 0

answer to the google

i didn't knew it but i need points

You might be interested in
What are possible consequences for cyberbullying?
MrRa [10]

Answer:

Victims of cyberbullying are more likely than their peers to abuse alcohol and drugs, have physical and emotional health issues, and may suffer from low self-esteem. Poor grades in school is another consequence of cyberbullying that can also be accompanied by an attempt by the victim to avoid other children by refusing to go to school.

Explanation:

8 0
3 years ago
Read 2 more answers
what is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulate
Soloha48 [4]

A honeypot is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion.

What is software?
Software is a grouping of computer programmes, along with auxiliary data and files. In contrast, hardware is the foundation upon which a system is built as well as what actually does the work. Executable code is the lowest level of programming and is made up of machine language instructions that are supported by a single processor, usually a central processing unit (CPU) or even a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent processor instructions that alter the previous state of the computer. One effect that is not immediately visible to the user is when an instruction modifies the value kept in a specific storage location in the computer.

To learn more about software
brainly.com/question/28224061
#SPJ4

4 0
1 year ago
If you were an online community director, you might use both chat and e-mail in your community. What are some similarities and d
stealth61 [152]

Emails are formal

Online chats are private and friendly

Emails are used for business

Online chats are for friends

5 0
3 years ago
A technician is troubleshooting a computer that will not communicate with any hosts on the local network. While performing a vis
tangare [24]

Answer:

Assuming that D is correct, the other answer is C.

Explanation:

<em>I used Dell Support to confirm this.</em>

It states that if the lights are off, it is not detecting the network and no connection is in place. You would want to confirm the NIC is enabled in the BIOS (as C states).

I hope this helps!

8 0
3 years ago
Two different names that refer to the same data item best defines:
Nezavi [6.7K]
You could call that a reference or a pointer.
5 0
3 years ago
Other questions:
  • Which is the highest level of the hierarchy of needs model?
    5·2 answers
  • Analog footage can be digitized using video _____ equipment.â
    7·1 answer
  • The number of pixels displayed on the screen is known as ________.
    14·1 answer
  • When asking questions critisim it is best to
    13·2 answers
  • مسألة لبرنامج الماتلاب لمصفوفة وعمود
    10·1 answer
  • Can somebody help I need it now please and thank you correct answer please
    10·2 answers
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    11·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • Write. true or false​
    5·2 answers
  • Hello :) new day <br> which one would u pick?<br> 1. chips 2. Gacha life 3. chocolate?<br><br> hehe
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!