1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
10

Which of the following pieces of evidence was NOT used to support the Theory of Continental Drift?

Computers and Technology
1 answer:
balandron [24]3 years ago
4 0
I think that the answer is D pretty sure
You might be interested in
What is unique address in ICT​
iren2701 [21]

Answer:

IP Addressing.

Explanation:

It stands for Internet Protocol address. It is a unique address that identifies a computer on a network such as the Internet.

Hope this helped you!

4 0
3 years ago
Which math ratio represents efficiency?
andrew-mc [135]

Answer:

I think its the second one

6 0
3 years ago
How ict tools changed the way we live explain it​
laiz [17]

Answer:

How does ICT change our way of living?

ICT has contributed a lot to change our everyday life such as letter to e-mail, market shopping to on-line shopping, classroom learning to e-learning, etc. This paper present's the effects of ICT as Home and Domestic Activities, Social Networking, Education, Health, Commerce, Banking, and Employment.

5 0
2 years ago
If a computer has a multicore processor, what can the operating system do to improve performance? How does this technique work
OLga [1]

Answer:

If a computer has a multicore processor then the operating system can run multiple threads to better the performance. And the maximum number of threads is equal to the number of cores. For one core there can be one thread. And the technique that is required here is termed as the multithreaded programming. And if you have a multicore processor, and if you assume that all your target device has that level of the processor then you can make use of it in designing applications as well. However, you need to provide an alternative for the device that does not have this facility.

Explanation:

Please check the answer section.

8 0
3 years ago
When a cryptogrpahic system is used to protect data confientiality what takes place?
Alex73 [517]

Answer:

Unauthorized users are prevented from viewing or accessing the resource

5 0
2 years ago
Other questions:
  • A motor controller controls the and of the motors.
    9·1 answer
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
    10·1 answer
  • Objectivity is only a small part of assessing a Web site. <br> a. True<br> b. False
    10·1 answer
  • We use them every day, but what is the overall purpose of a search engine?​
    10·2 answers
  • Lenny is a cheese packer at Cheddar Express. He is paid $.52 for every case of cheese he packs and loads onto delivery pallets M
    12·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • What file extension is used to name a compressed folder
    10·1 answer
  • An example of negative self-talk is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!