1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
11

How far back was the first car phone?

Computers and Technology
2 answers:
jeka57 [31]3 years ago
8 0

Answer:

June 17, 1946

Explanation:

zvonat [6]3 years ago
8 0

Answer:

June 17 ,1946

Explanation:

was first used in St. Louis

You might be interested in
Which element can be changed using the Print pane? Check all that apply
asambeis [7]

Answer:B C D E

Explanation:

EDGE 2021

3 0
3 years ago
45 points!!
pav-90 [236]

Answer:

ENQUIRE database system

Explanation:

5 0
3 years ago
Read 2 more answers
Do u have to divide or multiply this problem 5300 yd = mi
Alona [7]

Answer:

the answers is 3.011364 and if you need to roundnit would be 3.01

6 0
3 years ago
PLEASE HELP ME !!!!
Sedaia [141]

Answer:

Complete the ZipZapZop()

function so that it requests an integer from the user. The function should display a response following this pattern:

• Divisible by 3: zip

• Divisible by 5 zap

• Divisible by 7 zop

Otherwise, just display the number

Note 1 numbers that are divisible by more than one (3, 5, or 7) should contain

all applicable terms.

Notes 2 Note that you are displaying directly from this function, not returning a value to the calling function.

Hint: The number only prints if it is not divisible by ALL of 3,5,or 7

Explanation:

3 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Other questions:
  • Charges of the opposite tend to repel each other.
    9·2 answers
  • Have main create two objects: setA and setB.Input the values into setA (end with a 0 or negative) and input the values into setB
    12·1 answer
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • FINISH THE SENTENCE <br><br> buzzfeed____reddit_____
    5·1 answer
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • How is digital footprint created ?
    15·1 answer
  • Which of the following statements about cover letters is false?
    14·2 answers
  • The rules that govern the correct order and usage of the elements of a language are called the of the language:.
    7·1 answer
  • Why is internet download speed slower on a computer vs phone
    5·1 answer
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!