1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
15

When a piece of shiny silver jewelry gets tarnished, what has happened?

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
6 0
A
because if you leave certain metals in the rain they tarnish or rust. think about how if you leave a bike in the rain for too long it will start to rust on the metal parts
You might be interested in
What policy definition can help remind employees in the User Domain about what constitutes suitable use and improper use of corp
Helga [31]

Answer:

so so sorry I don't know

Explanation:

hope fully you'll get the answer

4 0
3 years ago
Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic
Shalnov [3]

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

5 0
3 years ago
Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounti
Alborosie

Answer: D. Deny read access to the Accounting folder for Bill through shared access security.

Explanation:

The statement that describes how to stop Bill from having read access to the folder without impacting any other users on the network is to deny read access to the Accounting folder for Bill through shared access security.

It should be noted that the local access security cannot be used in this case because the folder is shared from a network server that is within the active directory domain.

5 0
3 years ago
To display data in a certain manner, like alphabetical order, is called
taurus [48]

Answer:

D. Sorting

hope this helps!

6 0
3 years ago
. Evan is creating a worksheet and needs to copy information in cells A2:A13 into cells B2:B13. Which of the following is the ea
Fantom [35]
Highlight A2 and drag down and select the cells to A13. Then do ctrl+c to copy.
Next Highlight the cell B2 and then do ctrl+v. This will paste all the cells 
4 0
3 years ago
Other questions:
  • Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
    13·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • Implement a recursive program that takes in a number and finds the square of that number through addition. For example if the nu
    5·1 answer
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    5·1 answer
  • Information is best described as
    10·1 answer
  • Coordinate with
    12·1 answer
  • We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
    14·1 answer
  • The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
    14·1 answer
  • Select all the correct answers.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!