1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
8

Come up with a system, using only

Computers and Technology
1 answer:
masha68 [24]3 years ago
8 0

Explanation:

material

3 balões de erlenmeyer. .balanca

funil. . carbonato de

. rolha

. tubo abdutor

. seringa

You might be interested in
Create a function called biggestNum that returns the largest number in an array of integers. The function is passed only one par
goldenfox [79]

This is for Python

def biggestNum():

   array = []

   for i in range(8):

       number = int(input('Enter number: '))

       array.append(number)

   

   return max(array)

print(biggestNum())

5 0
3 years ago
Write the working of dot matrix printer?<br><br>no links<br>​
lbvjy [14]

The working of dot matrix printer is provided in the picture.

4 0
3 years ago
How do you use hand sanitizer <br><br><br><br><br> I need helpppp
Dimas [21]

Answer:

Scientifically speaking both are equally as effective as long as you thoroughly cover the surface of your hands, massage between your fingers, and under your nails.

Explanation:

3 0
3 years ago
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
The best way to ensure the accuracy and safety of your accounts is to:
Gekata [30.6K]
Use symbols and a different password for each one

6 0
3 years ago
Other questions:
  • How to write a program converting RGB to CMYK in python
    6·1 answer
  • Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
    5·1 answer
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
    8·1 answer
  • In order to estimate the percentage of defects in a recent manufacturing batch, a quality control manager at Intel selects every
    5·1 answer
  • A(n) ________ is a web application that allows users to easily add and edit content on a web page.
    15·1 answer
  • _____ check to see what links are on the user's web page and make sure they work; if a link is broken, they identify it and incl
    8·2 answers
  • Write a Java application that uses the Math class to determine the answers for each of the following: a. The square root of 37 b
    10·1 answer
  • In computer science how can you define "copyright, designs and patents act 1988"?​
    8·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!