1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
4 years ago
14

Which of the following represented an inch in ancient civilizations?

Computers and Technology
1 answer:
mixas84 [53]4 years ago
7 0

Answer:it’s the first one

Explanation:

You might be interested in
Pros and cons of access to a wide range of online services when it comes to an individual's safety?
Contact [7]
Talk about cyber bullying but also all of the advancement and conviences of technology
Hope that helps
6 0
3 years ago
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
A persons decision to take action without being asked is
Nimfa-mama [501]

Answer:

Initiative

Explanation:

Initiative: the power or opportunity to act or take charge before others do.

5 0
4 years ago
You can include up to _____ logical conditions in the and function.
Margaret [11]
You can include up to 255 logical conditions in the AND function. This is to test multiple<span> conditions at the same time.
</span><span>The syntax of the AND function is the following: =AND (logical1, [logical2], ...)</span><span>
The AND function can be true (one) and false (null), only one of these two values.
</span><span>The AND function will return #VALUE if no logical values are found or created during evaluation.</span>
5 0
4 years ago
Databases offer many security features including passwords to provide authentication, access levels to determine who can access
Murljashka [212]

Answer:

True

Explanation:

When using databases in a project, not everyone has the same access level, e.g the database admin may have the highest level of access (access to data on live mode), the software testers have their own level of access (access to data on test mode) and so on.  

7 0
4 years ago
Other questions:
  • The blue bar across the top of the screen informs you of the Screen Title, or what step you are on.
    5·1 answer
  • As time goes on, technology is likely to _______. A. Increase in complexity b. Decrease in complexity c. Stay at the same comple
    8·1 answer
  • C++
    11·2 answers
  • Add a new row to a table by clicking in the
    10·1 answer
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • Intelligent transportation systems use GPS to<br> Select all that apply.
    5·1 answer
  • What will be displayed after this code segment is run?
    5·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
  • Which popular video game franchise has released games with the subtitles World At War and Black Ops?
    10·2 answers
  • According to behaviorism, instruction should provide necessary stimulus in order for
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!