1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
5

I need them on this question

Computers and Technology
1 answer:
sweet [91]3 years ago
4 0

Answer:

Extended wear contacts. ...

Toric contacts. ...

Colored (tinted) contacts

Explanation: hope this helps

You might be interested in
Which of the following will Excel recognize as a date?
mario62 [17]

The option that shows how Excel recognize as a date is February 6 1947.

<h3>How does Excel see date?</h3>

The Excel  date is often seen as a regular number that is said to have been formatted to often look like a date.

One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.

Read more about Excel from

brainly.com/question/25879801

6 0
2 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are sa
stiv31 [10]

Answer:

This code is written in MATLAB.

function [result] = isPalindrome(array,length)

if length == 0 || length == 1 %if the array is empty or contains only one element, the array is a palindrome

result = 1;

else

for i = 1:length/2 %check all the elements forward and backward until the middle is reached

if array(i) ~= array(end+1-i)

result = 0;

return

end

end

result = 1;

end

Explanation: Please read the comments in the code. In MATLAB, Boolean values are 1 or 0 instead of True or False.

6 0
3 years ago
What is the advantage of using CSS?
Naily [24]

Answer:

c) It creates a better-structured document

Explanation:

The layout of a web page is better controlled. Style (CSS) kept separate from structure (HTML), means smaller file size. Reduced file size means reduced bandwidth, which means faster loading time.

3 0
4 years ago
Read 2 more answers
What column, row, and text formatting issues are important when designing tables and lists?
MrRissso [65]

Answer:

Microsoft Excel or Google sheets.

Explanation:

7 0
4 years ago
Other questions:
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • Binary data is written in hexadecimal. For example, when creating a graphic for a website, colors are represented by six hexadec
    12·1 answer
  • What is a type of destructive program?
    8·2 answers
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • Please fill these out. I really need this done.
    5·1 answer
  • Which tool is used to plan a web site?<br> HTML<br> Storyboard<br> Text editor<br> WYSIWYG
    5·2 answers
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much
    9·1 answer
  • Explain the importance of the educational apps.give an example to support your answer ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!