1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
11

Is jesus dead or alive

Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
8 0

Answer:

Explanation:

i think he alive but in heaven i dunno

You might be interested in
Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real numb
ycow [4]

Explanation:

==================  

lin_spaced_vector.m  

==================  

function out=lin_spaced_vector(in1,in2)%defining function

out=linspace(in1,in2,200);%200 spaced numbers between in1 and in2

end​

===================  

Executable File

===================

clear all%clears history

clc%clears screen

lin_spaced_vector(1,10)%calling function​

clear all

clc

lin_spaced_vector(1,10)

4 0
3 years ago
Technician A says that a common type of spontaneous combustion occurs when rags or papers that are soaked in solvents end up in
lakkis [162]
Hello!

I believe the correct answer would be B. Technician B, because a common type of spontaneous combustion occurs only when something gets really hot and then ignites itself, so Technician A is obviously incorrect.

I really hope my answer helped you! :)
3 0
3 years ago
Read 2 more answers
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
A program executes 15 billion instructions. You are running this program in two systems: System A: has a processor with 3 GHz an
katrin2010 [14]

Answer:

CPU clock cycles = Instruction count x CPI.

CPU execution time =

= CPU clock cycles x Clock cycle.

= Instruction count x CPI x Clock cycle.

T =

I.

x CPI x C

Explanation:

i'm guessing

7 0
3 years ago
Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented
Sidana [21]

Answer:

const MAXNR=150;

let candidates = {};

for(let i=2; i<=MAXNR; i++) {

   candidates[i] = true;

}

for(let p=2; p <= MAXNR; p++) {

   if (candidates[p]) {

       process.stdout.write(`${p} `);

       // Now flag all multiples of p as false

       i=2;

       while(p*i <= MAXNR) {

           candidates[p*i] = false;

           i++;

       }

   }

}

4 0
3 years ago
Other questions:
  • How is a cell named?
    9·1 answer
  • _______ is a variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
    9·1 answer
  • Which of the following best describes compounds.
    12·1 answer
  • Describe five different ways databases can be processed
    14·1 answer
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • 5 of 10
    7·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • Please answer me fast ​
    6·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • Match the item to the type.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!