1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
5

Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable.

Computers and Technology
1 answer:
densk [106]3 years ago
8 0

Answer:

stone bronze and iron.

Explanation:

Your welcome! :)

You might be interested in
What would be the most efficient way for the chain's
Aleks [24]

Answer: The answer is D)

Explanation:

Just got it correct!

8 0
4 years ago
Please explain a function in coding.
Julli [10]

Answer:

it is organized reusable code to perform some action

8 0
3 years ago
Somehow I lost 1000 points!!! Does anyone know what happened? Is it possible that I was hacked? ​
Dima020 [189]

Answer:

Explanation:

You most likely lost 1000 points because you cheated to get them if not there is a possibility you were.

6 0
3 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
Which of the following areas of study have been instrumental in shaping the development of HCT?
Ivan

Answer:

Cognitive Science and Graphic Design.

and hence D and E options are correct.

Explanation:

By HCT we mean Home and Community-based Treatment. This is, in fact, a home-based behavioral health-related service for the young people and all families which seek a better treatment plan, that is more advanced apart from an emergency therapy. And as far as the HCT's are concerned, they have well trained in quite a good number of treatment procedures like Cognitive Science related procedures. trauma centric cognitive treatment. However, a little bit of Arts and creativity is also required, and hence, you should know about the graphic design also.

8 0
4 years ago
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • Not all products are well suited for sale on the internet. T or F
    11·2 answers
  • Need help with this file and due today!!
    6·1 answer
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
    10·1 answer
  • What can you do with youtube red that you cant do with a normal account?
    8·2 answers
  • Computer programs and games are called what?
    13·1 answer
  • A vehicle equipped with an electronically shifted transaxle stalls whenever slowing to a stop after being driven over 20 miles (
    15·1 answer
  • How do you program a computer
    7·1 answer
  • Write a program that reads integers from the user and stores them in a list. Your
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!