1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
7

How and why does the daily path of the sun across the sky change for different locations on Earth?

Computers and Technology
1 answer:
miskamm [114]3 years ago
4 0

Answer:

Hi

Explanation:

Hi I need points to do my ela work !

You might be interested in
Given the function definition below, what is the effect of thecall:
Romashka-Z-Leto [24]

Answer:

Hi!

The correct answer is E.

Explanation:

void change(int ar[], int low, inthigh)  {  

 int temp;

 if(low< high)  {  <em>// here ask if the positions low and high of the array are the same.</em>

  temp= ar[low];  <em>// first, saves the element on ar[low] in temp.</em>

  ar[low]= ar[high];  <em>// second, the element on ar[high] in ar[low]. First switch.</em>

  ar[high]= temp;  <em>// third, saves the element on temp in ar[high]. Complete switch.</em>

  change(ar,low + 1, high - 1);  <em>// Recursive call, adding one position to low, and subtracting one position to high. </em><em>Important: </em><em>When low and high have the same value, the recursive call will finish.</em>

}

}

Result: Switch the lower half of elements in the array with the upper half.

8 0
3 years ago
Read 2 more answers
Forgot this website exsited wsp
Mariulka [41]

Answer:

no

Explanation:

5 0
2 years ago
Read 2 more answers
How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
Whitepunk [10]

Answer:

because they have to rest

3 0
2 years ago
Read 2 more answers
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
Write a program that accepts a whole number as
SashulF [63]

This is for Python

number = int(input('Number: '))

number = number * 12

print(number)

3 0
2 years ago
Other questions:
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • The init() command initializes the task queue and scheduler data structures. run Next Task() MUST run to completion whatever tas
    9·1 answer
  • Which command is not one of the available Change Case options?
    8·1 answer
  • "background" software that helps the computer manage its own internal resources is called ________.
    5·1 answer
  • What is the purpose of the new window command
    6·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • FIRST TO Answer for free brainlest. GOG GOGOGO
    6·1 answer
  • Select the correct answer..
    6·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
  • 2. What is MOST TRUE of a mature technology?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!