1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
11

Phil wants to make a dark themed superhero movie. What could be his target demographic

Computers and Technology
2 answers:
maria [59]3 years ago
5 0

Answer:

d

Explanation:

i think, because it makes the most sense to me.

VashaNatasha [74]3 years ago
4 0

Answer: Male, aged 18-25

You might be interested in
Describe any five Morden application areas of computer​
Alecsey [184]

Answer:

Some of the application areas of computer are 

1.banking,

2.education,

3.industries,

4.entertainments,

5.hospitals,

7 0
3 years ago
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, an
Nadya [2.5K]
Digital Immune System (DIS)
6 0
3 years ago
A document's margin is __________.
sleet_krkn [62]

Answer:

A. the blank area around an element in a document

Explanation:

Margin allows to add blank space on the Top, bottom ,right and left side of your element

4 0
3 years ago
Question 16 of 40
neonofarm [45]

Answer:

D hjjhhhhhhhhhhhhhhh

Explanation:

cuz

6 0
4 years ago
Read 2 more answers
Why do companies implement new technology?Select all that apply.
Wittaler [7]
All of them are correct except the last one
6 0
3 years ago
Other questions:
  • MTV can now be seen by most of the world's population. This is an example of
    7·1 answer
  • What purpose would tracking changes be most useful for?
    7·1 answer
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • Where is line-of-sight Internet common?<br> In space<br> Outdoors<br> Inside<br> In businesses
    10·1 answer
  • The assignment of numeric codes to characters follows a specific order called a(n) _____.
    15·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
    10·1 answer
  • You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
    14·1 answer
  • Which set of symbols encloses an if-then code block? Choose the best answer.
    10·1 answer
  • ASAP in the middle of this quiz Which of the following arguments might convince a local school board of the need to train upper
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!