1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
9

Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a cr

edible source? Select four options.
a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal
Computers and Technology
2 answers:
Katarina [22]3 years ago
5 0

Answer:

2345

Explanation:

Dafna1 [17]3 years ago
5 0

Answer:

✔ a nonprofit website that provides information on how to clean up the environment

✔ a recent newspaper article on global warming from a reputable news organization

✔ a government website providing information on national efforts to investigate global warming

✔ a magazine article about climate change in a respected scientific journal

Explanation:

simplified version: 2345

You might be interested in
Do this pls and i will give you 25 blls
saveliy_v [14]

Answer:

√A*BCD-DC(B-A)*BA(CD)

Explanation:

3 0
3 years ago
Read 2 more answers
What would best describe the future of cybersecurity?
Andrei [34K]

The best describe the future of cybersecurity is strong security policies offer little protection.

<h3>What is cybersecurity?</h3>

Cybersecurity is the security of data or computer systems. Cybersecurity is provided from the hackers that hacks the data and money online.

As everything is converting digital, the need of cybersecurity is increasing.

Thus, the correct option is B.

Learn more about cybersecurity

brainly.com/question/27560386

#SPJ1

5 0
2 years ago
Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
timurjin [86]
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
3 0
4 years ago
2. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transact
Reil [10]

Answer:

Explanation:

great question but dont know

7 0
4 years ago
Assignment 2: Room area
Y_Kistochka [10]

Answer:

a = float(input("Enter Side A: "))

b = float(input("Enter Side B: "))

c = float(input("Enter Side C: "))

d = float(input("Enter Side D: "))

e = float(input("Enter Side E: "))

area1 = 1.0* a * b

area2 = (a - c) * (d - e -b)

area3 = 0.5 * (a - c) * e

print ("Room Area: " + str(area1 + area2 + area3))

Explanation:

happy to help ^3^

5 0
3 years ago
Other questions:
  • Why don't we get together to watch the Academy Awards?
    15·2 answers
  • Write a program that converts temperatures in the Celsius scale to temperatures in the Fahrenheit scale. Your program should ask
    14·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • In order to "print" the data in an object, the class should override the _____ method.
    9·1 answer
  • Rate monotonic Analysis (RMA) is a model for predicting whether or not a system will meet its timing as well as throughput requi
    6·1 answer
  • Now suppose there are four links between source and destination (three routers in the path between source and destination). Each
    8·1 answer
  • In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
    5·1 answer
  • Complete the firstMiddleLast() function to return a new string with the first, middle, and last character from string. If string
    9·1 answer
  • Starting a computer after it has been turned off is term as​
    13·1 answer
  • What mechanism can organizations use to prevent accidental changes by authorized users?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!