1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lapatulllka [165]
3 years ago
13

3. In which of the following places can

Computers and Technology
2 answers:
maw [93]3 years ago
8 0

Answer:

On the World Wide Web

Explanation:

Sure theres always a homepage somewhere. But i dont know what your researching so i went with c.

alexdok [17]3 years ago
5 0
On the World Wide Web
You might be interested in
he wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders'
Kamila [148]

Answer:

The wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders' far-reaching trade networks

C preference for local natural resources

Explanation:

The Buk (mask) aged middle to late 19th century C.E., was located in Australia, Mabuiag Island, Queensland, Torres Strait, which is between Australia and Papua New Guinea with many small mostly uninhabited islands around. Archaeological excavations show people´s  arrival at  Mabuiag islands around 7,300 years ago, being very dependent on ocean´s products to survival.

Few surviving pieces, made out of local resources materials such as turtle shell, wood, fiber, cassowary feathers, resin and paint, tell us feathers were a throughoutly artistic material used in Oceania , but  turtle shells masks were Torres Strait´s people hand-crafted and unique hallmark to be used during assorted ceremonies.

7 0
3 years ago
A raised dot (ú) shows where the ENTER key was pressed. <br> a. True<br> b. False
MatroZZZ [7]
Its false nothing comes up when u press that key
5 0
3 years ago
Identifying Characters
alina1380 [7]
The answer is d I just took the test
5 0
3 years ago
Read 2 more answers
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
Firlakuza [10]

Answer: Interoperability

Explanation:

Interoperability is the skill in system that helps in communicating and exchanging information and services with each other.It can be used in various industries and platform as the task is performed without considering specification and technical build.

  • IoT(Internet of things) interoperability faces various challenges like standardization, incompatibility etc.Several steps are taken to for IoT equipment to deal with servers, platforms,applications, network etc.
  • Interoperability provides appropriate measure for enhancement of IoT devices .
6 0
3 years ago
Other questions:
  • If the polar bear were taken out of the food chain what would happen to the seal population
    10·1 answer
  • In C++ Please:
    11·1 answer
  • What does psychologist Edward Spector mean when he says “ We have an entire generation of guinea pigs in an experiment”?
    14·1 answer
  • When using a search engine, what is the name of a word or phrase somebody types to find something online?
    12·2 answers
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • Class secretType { public: static int count; static int z; secretType(); secretType(int a); void print(); static void incrementY
    8·1 answer
  • Use the drop-down menus to complete statements about options for inserting video files.
    15·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • Software that is decided to intentionally causing harm to a device, server, or network is 
    13·2 answers
  • Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!