1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
11

Is jesus dead or alive

Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
8 0

Answer:

Explanation:

i think he alive but in heaven i dunno

You might be interested in
Give the type and value of each result of the following Java expressions.
atroni [7]
Give the type and value of each result of the following Java expressions. a. (5 / 2) * 2.0  type is float value is 4.0 b. (5/2.0) * 2 type is integer value is 5c. "1.3" + "5.2" type is string value is 1.35.2d. 1 + 7.0 + "2" + "x"  this will produce an error because we cannot add variables of different type
3 0
2 years ago
Risk of new technology is NOT evaluated by asking questions during which phase?
neonofarm [45]

Answer:

the answer is D

Explanation:

hope this helps :)

4 0
2 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
2 years ago
Lenovo laptop
igor_vitrenko [27]
Oh i do i do i do .... but could u retake the pic. it is kinda blurry
4 0
3 years ago
List different examples of models​
aleksley [76]

Answer:

Planet 3D model

Chemical reactions on a computer simulation

Flowchart of how science has changed over time

Tectonic plate movement in a drawing or picture

Making an Atom cake (i've done it and it was fun)

Earth foam Structure with a quarter or it cut out to show the inside

5 0
2 years ago
Other questions:
  • True or false? malware problems and other compromises of your computer information are rare.
    15·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary stor
    11·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • Imagine that the following two lines of code are placed inside a
    11·1 answer
  • How fast is light? person that answers this will get points ​
    12·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    9·1 answer
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • Please help me answering this question
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!