1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
13

1.

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
8 0

Answer:

D. Are concerned with environmental issues is the answer

You might be interested in
Which type of address is the ip address 232. 111. 255. 250?.
svp [43]
I think it’s a multicast
8 0
2 years ago
How does making a phone call differ when using: A public phone A cell phone
rosijanka [135]

Answer:

Differ in the quality of their transmission.

Explanation:

For example, when using the public phone box, wired transmission is done not wireless as in cell phones. Public phone box use electronic signals transmitted through a cable network to send voice data which are not very effective for long distance communication.

However, cell phones wirelessly send electromagnetic wave signal to a cell tower close to the caller and then the information is then transmitted to cell tower close to the receiver within a split of a second. This method of communication has much advantages.

7 0
3 years ago
What's the difference between natural systems and man made systems <br>​
Aneli [31]

Answer:

Natural systems are already in place while man made systems were created by humans manipulating things in some way.

Explanation:

man made: human created

natural systems: existed without interference

5 0
3 years ago
Dropbox is an example of ________. Bluetooth technology optical storage SSD technology cloud storage
inessss [21]

IaaS

Laas is Framework as a help are online administrations that give significant level APIs used to dereference different low-level subtleties of basic organization foundation like actual registering assets, area, information dividing, scaling, security, reinforcement and so forth

7 0
2 years ago
8.9 code practice edhesive
nadezda [96]

Answer:

.

Explanation:

7 0
2 years ago
Other questions:
  • Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
    13·1 answer
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • In this exercise, you are given a phrase and need to return that phrase in all capital letters.
    6·1 answer
  • Which type of network topology is the most common and easiest to use?
    10·1 answer
  • Which of these engine components forms a tight seal between the piston and the cylinder and is necessary for proper engine opera
    13·2 answers
  • What does core mean? what are they for?​
    5·1 answer
  • To color the h2 heading, what tag would you use?
    6·1 answer
  • Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n &gt; k ) return f( k, n - k ); else retu
    8·1 answer
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!