1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
12

What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano

ther value C. something that has no value D. something that is valuable only because society values it highly
Computers and Technology
1 answer:
irakobra [83]2 years ago
3 0
B) something valuable outside of itself, leading to another thing of value.
You might be interested in
Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
SpyIntel [72]

Answer:

See explaination

Explanation:

CREATE TABLE CATEGORY

(

cid int NOT NULL,

description varchar2(1000),

PRIMARY KEY (cid)

);

CREATE TABLE PRODUCT

(

pid int NOT NULL,

description varchar2(1000),

cid int,

price int,

p_size varchar2(1),

CONSTRAINT chk_price CHECK (price>0),

CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),

CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)

);

7 0
2 years ago
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
EastWind [94]

Answer: Insertion steganography

Explanation: Insertion steganography is the way of encrypting the data with the help of a regular files and message. It is encrypted by the ordinary files because the identification of files can be neglected. This process is carried out just for the protection purpose in extra form and gets decrypted  in the destination port .It has the working based on the replacement of the bits in a file .

8 0
2 years ago
A tower or mini tower pc is a type of all- in -one unit true or false
Svetlanka [38]

Answer:

thx

Explanation:

5 0
3 years ago
Read 2 more answers
Which consumer document is most likely to help you if you have trouble figuring out how to operate a device
kenny6666 [7]
The answe is 'B', as it should contain all the required information on how to operate the device, as well as a troubleshooting guide.
6 0
3 years ago
Other questions:
  • The ____________ is a wildcard character that is used to search for an unknown single character.
    6·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • What is your favourite video game??​
    5·2 answers
  • A computer (mainframe, server, or workstation) that has an operating system enabling _____________ to access it at the same time
    11·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • What are 3 software programs for mobile computing?
    10·1 answer
  • Can you please help me
    9·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
  • What is the second row of letters in the keyboard called?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!