1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
7

DOSE ENY ONE KNOW WHAT TOOLS THEASE ARE NEXT TO THIS GUY BECAUSE I AM AT A LOSE ON THIS ONE??????????

Computers and Technology
2 answers:
vladimir2022 [97]3 years ago
6 0
Those look like very old tools
Wewaii [24]3 years ago
6 0

All are secret and destructive weapons I guess

You might be interested in
Louis wrote a check of $100 to the electricity company. After a few days he received a Notice of Dishonor from the bank regardin
diamong [38]

the checked bounced because he didn’t have any money.

mark me brainliest please!!!!!

4 0
3 years ago
In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between diff
Lynna [10]

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

8 0
3 years ago
What do you call the specific format that is used to give credit to someone else’s work, words or ideas?
Deffense [45]
It would be called a citation.
6 0
3 years ago
Read 2 more answers
Which of the following scenarios describes an IT
slava [35]

Answer:

-checking social media networks during working hours

-surfing the Internet during working hours for what to do on the weekend

-downloading a favorite band’s latest album from a file-sharing service

Explanation:

they are all correct on edg.

8 0
3 years ago
Read 2 more answers
Two independent customers are scheduled to arrive in the afternoon. Their arrival times are uniformly distributed between 2 pm a
seraphim [82]

Answer:

1/3

Explanation:

T₁ , T₂ , be the arrival times of two customers.

See expected time for the earliest and latest below.

The formulas used will guide you.

4 0
3 years ago
Other questions:
  • What is a technology that exists inside another device called
    11·1 answer
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • HURRRYYYY PLZZ!!
    13·2 answers
  • •Should other states wait to see if the high-speed rail system works well before starting their own plans for similar systems?
    15·1 answer
  • Which method will return the first element in an ArrayList employees?
    5·1 answer
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • Role of memory in a computer system
    10·1 answer
  • What are the functions of super computer?<br> ​
    7·2 answers
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!