1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
10

AONICidystoy solo de acuerdo onuestro3-1 En que consiste la moral social​

Computers and Technology
1 answer:
const2013 [10]3 years ago
3 0

hola no conozco el toldo, pero necesito puntos cerebrales tan lo siento

Explanation:

You might be interested in
COULD U ANSWER THIS ???
vladimir1956 [14]

Answer:

B.lightning striking a tree

Explanation:

The crowd dispersing in all directions is not a closed-loop by any means, and students jogging around an oval track as well is not a closed-loop, and also not a cross country run from one point to another. However, the lightning striking a tree is a closed loop that best models a circuit. And as lightning strikes the tree, like a closed circuit, tree catches the fire, or in circuitry words, the current is generated, and tree catches the fire due to it, just like bulb starts glowing.

3 0
3 years ago
What are the characteristics of the Outlook Rules Wizard? Check all that apply.
Marina CMI [18]

Answer:It is useful for staying organized.

Users can edit the rule description.

Users can move messages to folders.

It is divided into three template choices.

Explanation:

7 0
2 years ago
You have been tasked to set up an authentication server on a dmz that will allow only users from a partner company. what kind of
Lapatulllka [165]

The question above has multiple choices as follows;

a. Internet

<span> b. Intranet <span> c. Extranet <span> d. World Wide Web
Correct answer is C. Extranet
<span>You are able to use an Extranet to securely share part of a business’s operation with vendors, suppliers, customers, partners or any other business organization.  We can also view an extranet as an intranet extended to users outside the company.</span> </span></span></span>




7 0
3 years ago
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
In Excel 2016 a range of cells beginning with cell C5 and going to cell E9 is defined as
Ksivusya [100]
None of the above.
Cell range should be marked as, C5:E9
5 0
2 years ago
Other questions:
  • While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change. W
    10·1 answer
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • Write a sentence about a mineral you use and how you use it
    12·1 answer
  • When a speaker is finished talking, you should allow for _____.
    14·2 answers
  • Ned and Mary Ann are saving their files to a CD. When prompted, Ned will click on Burn file to disk, indicate the recording spee
    15·1 answer
  • Which file format would be appropriate for web graphics​
    6·1 answer
  • Who is famous for his three laws of robotics?
    9·1 answer
  • How can i see what websites are visited on my wifi
    6·1 answer
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
  • in a particular factory, a team leader is an hourly paid production worker who leads a small team. in addition to hourly pay, te
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!