1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
3 years ago
7

Write the correct word to complete the sentence:

Computers and Technology
1 answer:
spayn [35]3 years ago
8 0

Answer:

Legend

Explanation:

In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history

Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.

Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;

"According to legend, Bolster the Giant terrorised the people of Cornwall.​"

You might be interested in
Harry is undertaking a digital photography course as the college and wants to
Ludmilka [50]

C. Unconventionally yes it will break down the system potentially causing a virus

4 0
3 years ago
Why a design that doesn't fail initially fails after some time/use? identify at least 3 such mechanisms?
alina1380 [7]
Runs out of memory
has uninitialized    variables
uses  undefined behaviour

4 0
3 years ago
Identify 3 distractions for young drivers and explain how you plan to minimize these distractions.
Rom4ik [11]
1 distraction is phones , texting and driving . They could have a system in their car which activated by a voice assistant who could do it al for them
4 0
3 years ago
A petrol (gas) station is to be set up for fully automated operation. A driver inputs his or her credit card into the pump, the
malfutka [58]

Answer:

Explanation:

Gas Filling Station has pumps. Pumps have credit card readers. Driver can able to swipe their cards, pumps have Fuel. Pumps card readers communicate with Credit Company. Driver interacts with pump for fuel and credit card.

In this situation the following we need to treat as objects.

They are Pump, Card reader, Fuel tank, communication system, system controller and price table.

Design pattern for the following system is attached below

6 0
3 years ago
Transistors contain a huge number of integrated circuits <br><br> a. true or <br> b. false
malfutka [58]
False. Integrated circuits have transistors within them, not the other way around
6 0
3 years ago
Other questions:
  • What is the simplest way to convert a decimal number in a binar one in c++?
    8·1 answer
  • Writers should avoid jargon because jargon ______. a. Takes too long to use b. Limits what ideas can be explored c. Conveys too
    12·1 answer
  • A persons decision to take action without being asked is
    9·1 answer
  • Which is the last step in conducting a URL search?
    6·1 answer
  • How to make logo black and white in paint?
    14·1 answer
  • Which of the following is an example of a federal tax? A. Social Security tax B. Sales tax C. Property tax D. Transaction tax
    8·1 answer
  • The following function takes an array of n integers as its input and returns 1 if the array is sorted in non-decreasing order, 0
    15·1 answer
  • A painting company has determined that for every 115 square feet or wall space, one gallon of paint and eight hours of labor wil
    11·1 answer
  • What does the National Institute of Standards and Technology do? Promotes innovation by advancing measurement standards promotes
    15·2 answers
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!