1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
11

I need help, thank you

Computers and Technology
1 answer:
DENIUS [597]3 years ago
5 0

Answer:

A

Explanation:

When astronauts aboard the International Space Station (ISS) exhale carbon dioxide (CO2), it's removed from the air and pumped into space.

please mark brainliest :D

You might be interested in
How is “compromise" defined in the context of information technology and Select one answer.
Mama L [17]

Answer:

Usually this term is used when it's too late for preventive technical mesures, so probably a system, an account, a file is considered to be compromised when unauthorised ( by the user/ administrator) access determined a breach in the security system.

Therefore your answer would be B. the potential for an intrusion

4 0
3 years ago
Read 2 more answers
Rachelle is an office manager for an active real estate agency. She’s overseeing a transition to a more complete reliance on ele
Troyanec [42]

Answer:

She can use <em><u>NAS technology</u></em>

Explanation:

Also know as 'Network-Attached Storage'  is a simple way to store and share documents on a shared network in an office.

One of the earliest forms of NAS began development over 30 years ago when remote file access was developed. From that early stage, NAS has become a very powerful tool in managing corporate information, sharing it and keeping it safe.

Contrary to what many think, cloud storage is not an example of NAS.

8 0
4 years ago
Heelo how do u do python syntax lesson 11 on code academy
pochemuha

have you tried www.khanacademy.org 


3 0
4 years ago
When coding using the root operation Detachment, the term "ray" is used to describe a particular part of the hand and foot. What
irga5000 [103]

Answer:

Little finger or little toe.

Explanation:

The 5th ray describes little finger or little toe.

4 0
3 years ago
C++
Ede4ka [16]

Answer:

2 & 3

Explanation:

Only mathematical operations that can be used to change contents of pointer variables include addition, subtraction, comparison, increments and decrements.

Although modulus, division and multiplications are not possible. A snippet of code is attached showing pointers addition and subtraction and their result.

Check it by replacing + or - signs with *, / or % which represent multiplication, division and modulus respectively. It would result in an error.

4 0
4 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field pr
    12·1 answer
  • The field on which records are sorted is called the composite primary key.A. TrueB. False
    12·1 answer
  • What is a statement that adds 1 to the int j when the int counter has a value less than the int n?
    12·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
    10·1 answer
  • Can someone solve this for me please? It’s part of an escape room.
    13·2 answers
  • What network problems can be solved on your<br> end?
    13·2 answers
  • PLS HELP
    8·2 answers
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!