1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
3 years ago
15

Importancia de la química en la vida cotidiana​

Computers and Technology
1 answer:
maks197457 [2]3 years ago
5 0

Answer:

chemistry is very important because everything you do is chemistry . our body is made up of chemicals . chemicals reactions occurs when be breathe ,eat , etc . All matter is made of chemicals so that chemistry is very important in our life

You might be interested in
Maria wants to create an image for a Web page. Maria should use _____. help me
Inessa [10]
Graphics software
Hope it helps
8 0
3 years ago
Read 2 more answers
A systemic approach to creating and ensuring channel fluidity in the flows of goods and services through shared information, com
likoan [24]

Answer:

Explanation:

The one which best describes it is Co-opetition. Co-opetition often takes place when companies which are in the same market work put aside their differences and work together in the gathering of knowledge and research of new products, but they still compete for market-share of their products and in the application of the joint knowledge created.

7 0
3 years ago
Read 2 more answers
Which of these is a way hexadecimal is commonly used in computing?
Ludmilka [50]

Answer:

represent IPv6 network address.

Explanation:

Hexadecimal number is the representation of large data into small chunk. each number in hexadecimal is replaced by 4 bits of data. With the help of this number system we can reduce the size of the total data.

IPv6 address consist of hexadecimal number. If we represent this address in binary it will utilize 16 x 8 = 128 bits. 128 bit address is too long.

So, we convert the 18 bits data into hexadecimal. This conversion make this address smaller. To represent the IPv6 address, we usually use hexadecimal number representation.

3 0
3 years ago
10 POINTS! Janis is the only person who can respond to customer inquiries in her small travel company. She receives several cust
Katyanochek1 [597]

The mode of interent she would be using is A. Email. Customer inquires/ Customer Service is normally provided using the mode of Email. Hope it helps!

6 0
3 years ago
Read 2 more answers
Explain the role of protocol and standard organization in facilities interoperability in nertwork communication ​
Andru [333]

Answer:

Protocols are rules created to ensure messages are properly received and understood.  The following protocol requirements must be met:

1. An identified sender and receiver;

2. Common language and grammar;

3. Speed and timing delivery; and

4. Confirmation or acknowledgment requirements.

Explanation:

8 0
2 years ago
Other questions:
  • The source code of a java program is first compiled into an intermediate language called java ____, which are platform-independe
    8·1 answer
  • The ash and dust from a volcanic eruption can cause a _______ change in the environment.
    13·1 answer
  • Consider the following code segment: ArrayList bulbs = new ArrayList(); bulbs.add(new Light()); bulbs.remove(0); bulbs.add(new L
    15·2 answers
  • A prime number is an integer that is divisible only by 1 and by itself. Write a program that: 1. Takes a number as an input. 2.
    5·1 answer
  • You are developing a system to process lists of days of the week, represented as strings. Create a function is_weekend that cons
    12·1 answer
  • In an URL what does the domain name describe?
    14·1 answer
  • A person is trying to remember a list of 12 different items:
    6·2 answers
  • BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensu
    5·1 answer
  • Collaboration, listening, and negotiating are considered __________ skills.
    11·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!