1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
7

Who wrote the book of luke​

Computers and Technology
1 answer:
netineya [11]3 years ago
5 0
Luke himself wrote t the book
You might be interested in
A robot can complete 7 tasks in hour. Each task takes the same amount of time.
bekas [8.4K]

Answer:

A. I believe is 8.57

B. Should be 7

Explanation:

Please forgive me if I'm wrong thats my best shot. However if i am right please mark brainliest

3 0
3 years ago
Read 2 more answers
Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
Leona [35]

Answer:

creator of EFS file and domain of administration.

Explanation:EFS stands for encrypting file system, as the name suggests this system is used to encrypt files. It is easy to handle and it is not function-able on window 7 home, windows 7 premium.  Though it is easy to installed, deployment in large environment  needed careful planning

Though all the users have access to EFS features, only members with authority has the right to decrypt.

4 0
3 years ago
What is dialog box? ​
GenaCL600 [577]

Answer:

a small area on a screen in which the user is prompted to provide information or select commands is called a dialog box.

I hope this will help you

Stay safe

8 0
3 years ago
What is the most used gaming keyboard in 2022?
Mademuasel [1]

Answer:

Razer Huntsman v2 Analog

Explanation:

I have done some research on this before.

8 0
3 years ago
Which trait can be a positive or negative?
N76 [4]

Answer:

Prejudice can be either positive or negative.

4 0
3 years ago
Other questions:
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • Chandra, a student working on a group project, is trying to decide how to have the whole group suggest revisions for an essay. S
    10·1 answer
  • Add three methods to the Student class that compare twoStudent objects. One method should test for equality. A second method sho
    13·1 answer
  • List five ways in which the type declaration system of a language such as Java or C differs from the data definition language us
    8·1 answer
  • Hey! Would you please help me do this program?
    14·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • You use a 1200 watt hair dryer for 10 mintues a day.
    7·1 answer
  • Please help meh T^T Which of the following describes an application error? Select 2 options.
    5·2 answers
  • Um ok that makes sooo much sence
    11·2 answers
  • What is the full form of SAARC<br><br>And free point!! ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!