1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
15

In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /

Computers and Technology
1 answer:
ohaa [14]3 years ago
3 0

Answer:

You would use a twig first :)

Explanation:

You might be interested in
What file type starts at offset 0 with a hexidecimal value of ffd8?​?
kiruha [24]
The answer is jpeg.  It is <span>file type that starts at offset 0 with a hexidecimal value of ffd8?.  JPEG stands for </span>Joint Photographic Experts Group.  It is a popular image file format,  commonly used by digital cameras to store photos<span>. The format also supports different levels of compression, which makes it ideal for web graphics.</span>
5 0
3 years ago
4. What is the difference between portrait orientation and landscape orientation? (1.0 points)
Bezzdna [24]

Answer:

Portrait orientation is taller then it is wide, while landscape orientation is wider then it is tall.

Explanation:

3 0
4 years ago
Collaborative devices are web and mobile applications that allow users to share files, meet virtually in real-time, and assign t
const2013 [10]

Answer:

true

Explanation:

because collaborative devices are made to make work much productive and easier within a group. it's true since the following statements can result to productivity

6 0
3 years ago
Read 2 more answers
Please tell fast plzzzzzz.​
Vaselesa [24]

Answer:

false well if u know someone u can click it

6 0
3 years ago
What kind of resources can we share over the network? Plzzzzzzzz help!!!!!!
lubasha [3.4K]

Sharing network resources requires abiding by certain constraints, as follows:

<span>Security: Organizations present ongoing opportunities for unauthorized shared resources. Security mechanisms should be implemented to provide efficient parameters.Compatibility: Various client-server operating systems may be installed, but the client must have a compatible OS or application to access shared resources. Otherwise, the client may encounter issues that create communication delays and requires troubleshooting.Mapping: Any shared OS hardware drive, file or resource may be accessed via mapping, which requires a shared destination address and naming conventions.<span>File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared resources because the Internet is FTP’s backbone. File sharing is an LAN concept.</span></span>
3 0
4 years ago
Read 2 more answers
Other questions:
  • What are possible consequences for cyberbullying?
    11·2 answers
  • The Constitution party advances a conservative approach to issues and would most likely support policies that __________.
    10·1 answer
  • What stage of software development incorporates planning to help make changes in the project plan based of reviews
    12·1 answer
  • Importance of spread sheets​
    8·2 answers
  • A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
    7·1 answer
  • Memory cards from your cameras (SD cards) and flash drives are examples of __________.
    13·1 answer
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • Which of the following variables are string types?
    10·1 answer
  • You are the system administrator for Precision Accounting Services, which employs 20 accountants and 25 accounting assistants. T
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!