1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
7

Cuáles son las partes más importantes de una flor​

Computers and Technology
1 answer:
castortr0y [4]3 years ago
7 0

Answer:

estas son

Explanation:

El cáliz. Está formado por los sépalos, que son un conjunto de hojas verdes en la base de la flor.

La corola. Está formada por los pétalos que son hojas coloreadas en el interior de los sépalos.

Los estambres. Son los órganos masculinos de la flor. ...

El pistilo. Es el órgano femenino de la flor.

You might be interested in
If the motherboard is not getting power, it will not start the boot. ... A four-year old laptop will not boot and presents error
lakkis [162]

Answer:

<em>The right order of steps you should take to repare the laptop is: D A C B</em>

<em>Explanation:</em>

<em>D. Ask yourself if the laptop is still under warranty: Because they will replace the board for you or give you a new machine.</em>

<em>A. Ask yourself if replacing the motherboard will cost more than purchasing a new laptop: since technology evolve every day, you might consider buying a new faster, better, advanced machine.</em>

<em>C. Find the service manual to show you how to replace the motherboard: the support assistence will guide you trhough the right way of replacing the board.</em>

<em>B. Find a replacement motherboard: choose the specific one or maybe try to find a better model, that can improve your computer performance.</em>

7 0
3 years ago
Select the true statement about a scanner.
Mandarinka [93]

Answer:

c. It is an input device that enables users to convert hard copies to digital images or text.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

A scanner can be defined as an input device designed for transferring informations and images from hardcopy (physical) documents to digital computer files. Thus, it's simply an electronic input device that is used to digitally scan or copy data (informations) from a hardcopy document such as photographs, paper files, printed texts etc and then converted to a digital computer file in formats such as png, or jpeg. The scanner is a device which avail users the ability and opportunity to view, edit and transfer hardcopy document on a computer system in soft-copy.

Majority of the scanners used around the world are flatbed scanners and as such have a flat glass surface for scanning documents.

Basically, all scanners are to be used with a device driver software pre-installed on the computer before the configuration of the scanner.

Other types of scanners are drum scanners, contact image sensor (CIS) scanner, CCD scanner, planetary scanner, 3D scanner, Roller scanner etc.

6 0
3 years ago
I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
gogolik [260]

I'm better then u in brawhlla

5 0
3 years ago
Which actions should be taken so that transitions proceed automatically? Check all that apply.
DiKsa [7]

Answer:

a,d

Explanation:

because when you the after box you will probably see it,and you got put effects to the transition

6 0
4 years ago
Read 2 more answers
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Other questions:
  • Explain a business scenario where management information systems plays a part.
    11·1 answer
  • ATM is an abbreviation that stands for Automatic Teller machine?
    5·2 answers
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I<br>please help need the correct answers to all
    6·1 answer
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
    14·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • What occurs when an application sends user-fed data directly to a web browser without authenticating or deleting the content? Cr
    15·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing li
    14·1 answer
  • This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!