1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
2 years ago
5

Science can give us

Computers and Technology
2 answers:
Licemer1 [7]2 years ago
7 0

yup i totally agree

kondor19780726 [428]2 years ago
4 0
Both new understanding and new information
You might be interested in
I got a kahoot! Totally random pls join!<br><br> Code 08408519!
OlgaM077 [116]

Answer:

say less

Explanation:

5 0
3 years ago
Read 2 more answers
Computers and technology<br> Help 10 Points!!!!
jonny [76]
Hi!

The answers are:
For the bookmark one, it is A. Below address bar
For the edge printing one, it is again A. Options
For the last one, it is C. Internet Explorer

-ASIAX ·<span>Frequent Answerer</span>
3 0
3 years ago
Has anyone done the unit 10 lesson 9 encryption/decryption texts on code.org?
Pani-rosa [81]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

5 0
3 years ago
One should take to prevent ulcers in the gastrointestinal tract?​
Andrew [12]

Answer:

food??

Explanation:

if you don't eat food, the acid produced in the stomach will break down the stomach walls instead of the food, giving you ulcers

7 0
2 years ago
Cuál es la diferencia entre hackeo y crackeo
Sauron [17]

Answer: El hackeo es el proceso de intrusión en los sistemas informáticos sin autorización para acceder a ellos, con buenos o malos propósitos, el cracking es la misma práctica aunque con intención delictiva.

3 0
2 years ago
Other questions:
  • Together, what do the divisions of the DHSMV do?
    12·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • How can I link two classes together with spigot to make it so I can open a method within the said class. Trying to open my class
    13·1 answer
  • When the "swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely diff
    11·1 answer
  • What are the two basic classes of active directory objects?
    14·1 answer
  • Why is it essential for every person living in the 21st century to have a computer​
    9·1 answer
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
  • Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!