1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
15

Write a chemical reaction to show that nitric acid contains nitrogen​

Computers and Technology
1 answer:
sleet_krkn [62]3 years ago
7 0

Answer:

HNO3 &NO2

Explanation:

You might be interested in
The concept of "space" on a computer usually refers to the___.​
vesna_86 [32]

Answer:

Option "A" is the correct answer to the following question.

Explanation:

Word 'Space' use for total storage available in hard drive.

Free storage in the hard drive is commonly called space, space is an empty place similarly free or empty space in a hard drive called "Space".

Usually, the term space is used for the empty place, so we can say that the appropriate choice is correct.

4 0
4 years ago
Characteristics of RAM​
lara [203]

Answer:

Short Data lifetime, Less Expensive, Needs to be refreshed often, Smaller in size, etc. tell me if you need more.

7 0
3 years ago
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
Wewaii [24]

Answer:

B. Malware

Explanation:

Malware is general to most harmful programs on a computer, as Adware is a potentially unwanted program that is designed to advertise other programs or services. And ransomware is a program that will encrypt important user files such as; documents, pictures, and videos. Spyware is a program that is designed to spy on users, examples are; using your camera without your consent, key-loggers, and taking screenshots of our desktop. Thus i believe it is malware because the question covers multiple categories.

6 0
4 years ago
The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
artcher [175]

The publisher tab in the application control allows you to manage the various certificates that are used to sign to binaries. Publisher allow executables of a particular vendor, signed by a security certificate issued to the vendor by a Certificate Authority. Also, all applications and binary files either added to or modified on an endpoint that are signed by the certificate are automatically added to the whitelist.

3 0
3 years ago
Write the Number class that can be used to test if the number is odd, even, and perfect. A perfect number is any number that is
egoroff_w [7]

Answer:

Explanation:

The following code is written in Python. It creates a class that takes in one ArrayList parameter and loops through it and calls two functions that check if the numbers are Perfect, Odd, or Even. Then it goes counting each and printing the final results to the screen.

class NumberAnalyzer:

   def __init__(self, myArray):

       perfect = 0

       odd = 0

       even = 0

       for element in myArray:

           if self.isPerfect(element) == True:

               perfect += 1

           else:

               if self.isEven(element) == True:

                   even += 1

               else:

                   odd += 1

       print("# of Perfect elements: " + str(perfect))

       print("# of Even elements: " + str(even))

       print("# of Odd elements: " + str(odd))

   def isPerfect(self, number):

       sum = 1

       i = 2

       while i * i <= number:

           if number % i == 0:

               sum = sum + i + number / i

           i += 1

       if number == sum:

           return True

       else:

           return False

   def isEven(self, number):

       if (number % 2) == 0:

           return True

       else:

           return False

6 0
3 years ago
Other questions:
  • What operating system allows various teams in its office to network and collaborate on projects
    5·1 answer
  • Web design people please help!
    7·1 answer
  • When uninstalling software, it is best to delete the folder containing the software?
    11·1 answer
  • a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
    6·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • 2. Which Interface uses
    7·1 answer
  • What will be the index of leaf node in a right-skewd binary tree with height =7,where every parent has at most one child?​
    15·1 answer
  • Difference between a port and a connector
    10·1 answer
  • Do anyone else receive random points from Brainly… because I swear I had like 2K+ something and I check and Im at ACE… and with
    10·1 answer
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!