1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
12

Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack,

you discover some rope, a pocket knife, a roll of duct tape, and three modern technological devices. Where are you? What is the time period? What tech devices are in your backpack? Write a diary or journal entry about how you survive for 24 hours with the help of the items you have on hand. Describe in detail and write a story about what you did those 24 hours.
Computers and Technology
1 answer:
sattari [20]3 years ago
5 0

Answer:

Day 1:Today I time traveled. it was pretty crazy, hope nothing goes bad.

1 hour in: Went asking around to see who is the king around here is. Everyone seems to look at me weird, I don't know why.

2nd hour: while asking around this dude came up to me and asked for silver. I said I didn't have any so then he walked away. He was an older man with a scrawny figure. Most people I see are a little bigger.

3rd hour: I finally found out who the king was

but I cant remember his name right now so I'll pit it in a different entry.

here u can start out with this if u want me to finish it just ask.

You might be interested in
How can you tell that a website is valid and reliable?
larisa86 [58]
If there is an about page where it tells whom made the website, as well as a copyright 2016 on the bottom of the page. This basically means the website is useful and updated by the creators. Another factor which the site doesnt always need but if it has an https at the beginning of the url then it should be good and valid because that means the site is secured. Also factor in the sections where articles are present, if they have a date and an author towards the bottom or top of the article, then it can be trusted as well. Theres a lot more you can look for in a site and validating if it is an okay site but these are a few examples. Hope this helped!:)
3 0
3 years ago
When designing a website, Claire creates a color palette for the web pages. How can the color palette help Claire design effecti
Vilka [71]
Consistency and unity
highlight important content
4 0
3 years ago
What is the biggest difference between a movie and a game?
sveta [45]

Answer:

It could be D

Explanation:

3 0
3 years ago
The process of generating an image from a 2D or 3D model using computer programs is called ........
Sunny_sXe [5.5K]

Answer:

Rendering or image synthesis is the process of generating a photorealistic or non-photorealistic image from a 2D or 3D model by means of a computer program. The resulting image is referred to as the render.

Explanation:

3 0
3 years ago
. Differentiate between Radio waves and Microwaves
ankoles [38]
Well you listen to a radio and you put food in a microwave
7 0
4 years ago
Other questions:
  • What is heat sink?what is its use?If it is not in the system what will happen?
    12·1 answer
  • What wireless networking radio frequency yields faster speeds but offers shorter range ?
    11·1 answer
  • How do you know if the website is secure if you make a purchase
    13·2 answers
  • Wich is the correct process for selecting an entire row in a spreadsheet?
    12·1 answer
  • When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
    5·1 answer
  • Write a method __repr__(self) that returns a string representing an AIPlayer object. This method will override/replace the __rep
    13·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Inappropriate use of technology makes it easier for cyber bullies to <br> others.
    13·2 answers
  • Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done.
    11·1 answer
  • Which original VPN protocol is supported by most platforms but offers low levels of security?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!