1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
12

Taking a recipe and breaking it down into its individual sections, like ingredients, preparation, cooking instructions, and nutr

itional information, is an example of _____.
refinement

pattern recognition

decomposition

abstraction
Computers and Technology
2 answers:
Anna11 [10]3 years ago
8 0
1.For each of the following, give the name of an element from Period 4 (potassium to krypton), which matches the description.
Elements may be used once, more than once or not all.. Single line text.
(1 Point)
an element that reacts with water to produce a lilac flame

2.For each of the following, give the name of an element from Period 4 (potassium to krypton), which matches the description.
Elements may be used once, more than once or not all.. Single line text.
(1 Point)
an element used as an inert atmosphere

3.For each of the following, give the name of an element from Period 4 (potassium to krypton), which matches the description.
Elements may be used once, more than once or not all.. Single line text.
(1 Point)
an element that has a valency of 3

4.Write a balanced chemical equation for the reaction between potassium and water. (Non-anonymous question). .
(1 Point)

Upload file
File number limit: 1Single file size limit: 10MBAllowed file types: Word, Excel, PPT, PDF, Image, Video, Audio
5.For each of the following, give the name of an element from Period 4 (potassium to krypton), which matches the description.
Elements may be used once, more than once or not all.. Single line text.
(1 Point)
an element with a fixed valency of 2 that not is not in group 2
cestrela7 [59]3 years ago
5 0

Answer- B: pattern recognition

Explanation: Correct on Edg 2020/2021.

You might be interested in
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
Monica [59]
<span>Keyloggers can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
</span><span>The keylogger is also called keystroke logger or system monitor. This technology used to monitor and record each keystroke typed on a specific computer's keyboard. </span>
6 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Why does fiber optic communication technology have a significant security advantage over other transmission technology? higher d
erik [133]
Higher data rates can be transmitted Hope this helps!
7 0
3 years ago
4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
meriva

Answer:

The reason we are more honest online is simpler than we think, says Hancock. In the past, before there was modern technology or even written language, people could lie to each other easily. Once the words were said, they disappeared. ... Technology therefore might make us more honest than ever

6 0
3 years ago
Read 2 more answers
PLEASE HELP!!!
uysha [10]
The next line is 0___________________________
3 0
2 years ago
Other questions:
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • My mac book airs touch pad stopped working and i can't click. what do i do?
    5·2 answers
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • Networking and telecommunications technologies, along with computer hardware, software, datamanagement technology, and the peopl
    11·1 answer
  • Fill in the blank with the correct response.
    5·2 answers
  • GMI = $4,666.67 Total Monthly Deductions $1,131.00 What is the Net Monthly Income (GMI - Total Monthly Deductions) =
    9·1 answer
  • Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele
    13·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!