1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
2 years ago
15

What is The scientific name for plastic​

Computers and Technology
1 answer:
SVETLANKA909090 [29]2 years ago
8 0

Answer:

Polyethylene or polythene (abbreviated PE; IUPAC name polyethene or poly(methylene)) is the most common plastic in use today.

Explanation:

You might be interested in
What is the default delay before scripts are executed?
kenny6666 [7]
Answer is 5 minutes

The default value for windows 8.1 joined to a server 2003 domain logon scripts delays is not configured. However, the windows 8.1 may have a delay processing logon scripts of 5 minutes. The script does not execute until 5 minutes are over. Users have a Group policy applied to them that is used to assign a logon script.


8 0
2 years ago
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
muminat

Answer: I think it’s D

Explanation: the rest apply to the the rules of 1NF and 2NF

5 0
2 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
2 years ago
Contact Us Save
svetoff [14.1K]
All except drinking caffeinated beverages:)))
3 0
2 years ago
The first step of converting data into a table is:
adell [148]
B. Select the range of data. You have to highlight it first so it knows what you are going to convert into a table.
8 0
2 years ago
Other questions:
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early
    12·1 answer
  • During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installe
    15·1 answer
  • One reason to buy a home instead of rent a home is:
    5·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • Email Communication has it own set of etiquette guidelines for users to follow if they want to be effective communicators. Which
    7·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • _____ are fields that are used to personalize a mail merge document
    9·1 answer
  • What are three coding languages that are used to build websites?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!