1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
12

10. List three adaptations of wind-pollinated plants to promote pollination.​

Computers and Technology
1 answer:
tia_tia [17]3 years ago
7 0

Answer:

No bright colors, special odors, or nectar.

Small.

Most have no petals.

You might be interested in
20 points!!!!! Plz answer quickly
Elena L [17]

Answer:

other words are not clear

3 0
2 years ago
Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation throughout a document. Which
Ivan

Not really is she wants the words that she's typing down sometimes it's not necessary to leave it to the auto correct It can always be bad when re-reading it again.

5 0
2 years ago
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
babymother [125]

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

5 0
3 years ago
Lenovo laptop
igor_vitrenko [27]
Oh i do i do i do .... but could u retake the pic. it is kinda blurry
4 0
3 years ago
Identify the term that refers to the right to control access to ourselves and to our personal information.
g100num [7]

Answer:

Privacy

Explanation:

In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex  policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.

The privacy control access mechanism giving the right to control the personal information.

7 0
2 years ago
Other questions:
  • A hierarchical topology is also called a _____ topology.
    9·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • What is the definition of digital literacy?
    7·2 answers
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    9·1 answer
  • A __________ is typically stored in a JAR file and contains one or more packages that you want to make available to other projec
    15·1 answer
  • Can you install Ubuntu on a hard drive by porting from the folder to the HDD?
    10·1 answer
  • Data aggregate functions
    6·1 answer
  • Which of the displays could be represented by a single bit?
    12·2 answers
  • What is a task that is not associated with loading existing data into a new ERP system.
    11·2 answers
  • What is the effects of computer and internet attacks​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!