1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
11

Which question about whale sharks is nonscientific?

Computers and Technology
2 answers:
ddd [48]3 years ago
6 0
Does the whale shark like having a large mouth.
statuscvo [17]3 years ago
4 0

Answer:

Option (3)

Explanation:

Scientific questions are those that follow the principle of science and that can be tested and the hypothesis must be proved. When a question does not fulfill these conditions then, it is considered to be a non-scientific question.

From the given option, "does a whale shark like having a large mouth?" is a non-scientific question.

It is because it does not involve anything scientifically. This question is about the whale shark, whether it likes to have a large mouth or not. This question does not provide any answer related to science and the answer cannot be tested and o hypothesis can be constructed.

Hence, the correct answer is option (3).

You might be interested in
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
il63 [147K]

Answer:

The answer is "option c".

Explanation:

A Web-centered view ensures anything has been programmed for the Web app or program. example Webified. This is a definition, that is used for personal use only and all other duplication is strictly forbidden without the approval of the author. and other options are not correct that can be defined as:

  • In option a, the legacy system is a method that is obsoleted today.
  • In option b, The mission-critical systems are used in the navigational system.
  • In option d, A distributed system permits the sharing of information that includes software that is connected with a network.

6 0
3 years ago
SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
IRINA_888 [86]

Answer: (B) <em>False</em>

Explanation:

SecOps also known as the Security Operations is referred to as a collaborative or combined effort between Information Technology security and the operations teams that tend to integrate technology, tools, and processes in order to meet the collective aim goals and aim of keeping an organization and enterprise secure while on the other hand reducing risk and also improving organizations agility.

5 0
3 years ago
Two fingers are assigned to six letters each. What fingers are they?
Lena [83]

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

8 0
3 years ago
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organiza
mixas84 [53]

Based on  mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.

<h3>What is Joint Tactical Operations (JTO) Procedural Handbook?</h3>

This is known to be a book that contains all  the provisions that is needed by system operators along with some technical parameters and tactical procedures.

It is often used  for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.

Learn more about military from

brainly.com/question/525279

6 0
1 year ago
How do I cancel a friend request?
dusya [7]

Answer:

By pushing cancel

Explanation:

It's simple

3 0
3 years ago
Read 2 more answers
Other questions:
  • Automotive engine cylinder heads can be made of what?
    7·1 answer
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
    12·1 answer
  • A computer’s BIOS is defined as the
    12·2 answers
  • Write a Python program that reads the CSV file, compares the population estimates of every row for 2010 and 2017 and computes th
    10·1 answer
  • Can anyone fill in the space please
    6·1 answer
  • How to cancel branly subscription??​
    8·1 answer
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • HURRRY WILLL GIVE BRAINLIST!!!!!!
    12·1 answer
  • How can we avoid falling victim to a phishing or pharming scheme
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!