1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
15

When a piece of shiny silver jewelry gets tarnished, what has happened?

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
6 0
A
because if you leave certain metals in the rain they tarnish or rust. think about how if you leave a bike in the rain for too long it will start to rust on the metal parts
You might be interested in
A license may limit the use of a software application to a specific device. Group of answer choices True False
BigorU [14]

Answer:

true

Explanation:

8 0
2 years ago
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
qaws [65]

Answer:

Se explaination

Explanation:

/Declaring variables

integer currentPrice

integer lastMonthPrice

integer changeLastMonth

float mortagage

//Reading input

currentPrice = Get next input

lastMonthPrice = Get next input

//Calculating price change

changeLastMonth = currentPrice - lastMonthPrice

//Calculating mortagage

mortagage = (currentPrice * 0.051) / 12

//Printing output

Put "This house is $" to output

Put currentPrice to output

Put "\nThe change is $" to output

Put changeLastMonth to output

Put " since last month." to output

Put "\nThe estimated monthly mortgage is $" to output

Put mortagage to output

3 0
3 years ago
K. What are the types of page orientation?​
Leokris [45]

Answer:

there are 2 landscape and portrait

Explanation:

there are just 2 you can confirm using word and layout

4 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
To find out how much ram is installed on a machine, in windows go to the user: a power ______ is a part inside a computer case t
shusha [124]
<span>a power _supply_ is a part inside a computer case that supplies power to the motherboard and other devices that are installed user: when a hard drive is first recognized by windows, it is assigned the _basic_ disk status user: utilize a _64_-bit os if you are looking for increased performance and you have a system that can support it.</span>
4 0
2 years ago
Other questions:
  • Carmina wants to move a paragraph to the right margin of the document she is working in. She moves her cursor to
    8·2 answers
  • If you want to use your computer for recording your band, you would benefit most from a(n)
    13·2 answers
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • What should be included in the closing portion of your letter or e-mail?
    12·2 answers
  • A blank is a copy of one or more files that is made in case the original become lost or damaged
    7·1 answer
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • The Business Information Building Block feature is available in the _____ grouping on the Insert tab.
    13·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    10·1 answer
  • The architecture in which the database resides on a back-end machine and users access data through their workstations is
    5·2 answers
  • How to identify mistakes in a html code??​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!