1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
13

What is humanity’s greatest invention?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
8 0
Jello, specifically strawberry kind it’s very delicious
You might be interested in
Briefly explain five measures you have undertaken to protect your confidential
Gnom [1K]

Answer:

by putting it in old fashioned password box

Explanation:

I I think I should say so that's a good person is not able to go see guys place where there's a nice specifically said that it must be old fashioned lunch boxes I don't usually be opened

5 0
4 years ago
It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
Y_Kistochka [10]

Answer:

The laws and regulations will often define sensitive or protected data and the reporting requirements in the case of a data breach. Failure to follow the prescribed process can often result in fines or other penalties.

Explanation:

These data security laws should be standardized worldwide in order to stop internet abuses.

5 0
4 years ago
How does applying Fontworks effects to text on an advertising flyer change the text?
Cerrena [4.2K]

Answer:A

Explanation:

5 0
3 years ago
Read 2 more answers
A user has requested a field that counts the number of child record associated with a custom object. These custom objects have a
wel

<em>The answer is D. </em>

<em> </em>

<em>It can be presented using Visual Flow such as ER Diagram to show relationships of child record and the object. ER Diagram or Entity Relationship Diagram are graphical charts that is showing how entities such as child, parents and other objects/ persons and how they could be related from one another. Relationships can be one to one, one to many, many to one and many to many.</em>

3 0
3 years ago
How does a computer work
ivann1987 [24]

Answer:

computer works on electricity

Explanation:

6 0
3 years ago
Other questions:
  • Select the correct answer.
    8·1 answer
  • As the design phase of an SDLC begins, programming languages, development tools, and application software needed for the new inf
    13·1 answer
  • What is the purpose of look up tables in spreadsheet software apex
    13·1 answer
  • Which feature of Microsoft power point make tiles fly in on the clock of a mouse
    8·1 answer
  • When communicating with a server on another subnet, which of the following settings is used to determine which direction it need
    6·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • You are using a PowerPoint template from your school to present your research findings in front of the class. What would you do,
    13·2 answers
  • What is the name of the FOLDER in which the file named "script" is contained?
    13·1 answer
  • Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
    6·1 answer
  • Reflection image and design
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!