1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
14

Which of the following best describes the purpose of an Egyptian pyramid?

Computers and Technology
2 answers:
Flura [38]3 years ago
7 0

Answer:

C

Explanation:

Had this on edgnuity

Please give a brainliest

Katarina [22]3 years ago
6 0

Answer:

The purpose for the pyramids were B. The pharaoh's burial chamber. But also their sarcophagi, and jewellery were found in some of them but the main reason why they were made was to be used as tombs for their pharaoh's.

Yeh that's my explination if you havn't given brainliest yet I would like to have it or a like would be fine! Yelp good bye

You might be interested in
Write the definition of a public class Simple. The class has no constructors, methods or instance variables.
vazorg [7]

Answer:

public class Simple{}

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following are examples of third party software that banks use? (Select all that apply.)
Elenna [48]

Answer:

c , <u>it</u><u> </u><u>is</u><u> </u><u>a</u><u> </u><u>corre</u><u>ct</u><u> </u><u>an</u><u>swer</u><u> </u><u>for</u><u> </u><u>the</u><u> </u><u>que</u><u>stion</u>

4 0
3 years ago
10. Calculate the checksum for blocks of data with the following byte sum. (a) 1220 (b) 950​
OLga [1]

Answer:kalo gk salah yang

a

Explanation:

5 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
How has social media and the workplace affected you?
MAVERICK [17]

Answer and Explanation:

Social Media keeps on developing, as do the discourses in regards to its application inside the domain of business and learning.

There are different translations of online life, regardless of whether it is explicit to systems administration and web 2.0 innovations or ranges the utilization of any current innovation that improves social connections.

Social media, in any case, has numerous advantages to business, particularly the obvious head-ways in joint effort and correspondence.

As the innovation of social media keeps on changing and develop in notoriety, organizations should think about techniques to use its utilization in the work environment.

5 0
4 years ago
Other questions:
  • 8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
    7·1 answer
  • What is the most common programming language that's not python?
    15·2 answers
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • The file extension for Access 2007 and 2010 database filenames is .accdb. What is the file extension for older versions of Acces
    5·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • Given a link with a maximum transmission rate of 11.7 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
    13·1 answer
  • What is the meaning of N.W.O​
    9·1 answer
  • How can you know if the information is based on scientifically collected data and if it's corroborated by other sources? Follow
    7·2 answers
  • Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
    14·1 answer
  • What is Smart Content Profits all about?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!