1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
6

Typically homes ___________ over time and cars ______________ over time.

Computers and Technology
2 answers:
fomenos3 years ago
4 0
Typically homes erode over time and cars rust over time. 

this is what i believe it is 
Arisa [49]3 years ago
4 0
Typically homes <span>depreciate over time and cars appreciate over time.</span>
You might be interested in
What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
blsea [12.9K]

Answer:

If request granted then T₁ and T₂ are in deadlock.

Explanation:

See attached image

4 0
3 years ago
Outlines help you visualize the slides and the points you will include on each slide.
kvv77 [185]
I don’t know I think true
6 0
3 years ago
plan and implement an appropriate research design to investigate your aims with due consideration of ethnics​
DanielleElmas [232]

Answer:

Join wev-euby-kcr join

8 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to k
Norma-Jean [14]

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

5 0
4 years ago
Other questions:
  • How to search multiple microsoft word documents?
    15·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • Which of the following office online apps is most effective for creating multi media presentation
    10·2 answers
  • What is a spec sheet?
    9·1 answer
  • The advent of optical discs was made possible by developments in ____ technology.
    5·1 answer
  • In this lab, you complete a prewritten C++ program that calculates an employee’s productivity bonus and prints the employee’s na
    6·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • When Creating a FPS game what basic rules would you add?
    12·1 answer
  • HURRY
    8·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!