1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
7

Which device do you think is the most important in the development of human civilization

Computers and Technology
1 answer:
insens350 [35]3 years ago
7 0

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

You might be interested in
Excel files have a default extension of ?
podryga [215]
I think .ppt

If I’m wrong I’m sorry

Ik lil bit but this is my max for now
4 0
3 years ago
Can someone please help me with this ,it is my assignment of technology and agriculture year 8
zmey [24]

Answer:

?????????/?????????

Explanation:

5 0
2 years ago
Convert 578.2 into hexadecimal​
Digiron [165]

Answer:

242.33333333

Explanation:

578.2

578÷16 -> 36 R 2

36 ÷16 -> 2 R 4

242.

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.2 x 16 -> 3.2 F 3

.33333333

242.3333333

4 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
IS ANYONE ELSE JUST GETTING PPL PUTTING LINKS WHEN U ASK A QUESTION???
TiliK225 [7]
UGH IKR, LIKE JUST ANSWER THE FRICKIN QUESTION
4 0
3 years ago
Read 2 more answers
Other questions:
  • Fill in the blank. Do not abbreviate.
    6·1 answer
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • 1.Which type of camera tool pushes the picture back and makes it wider, exaggerating the distance between the background and for
    13·2 answers
  • Which of the following economic systems leaves production decisions completely up to the producers?
    15·2 answers
  • If a table is designed so that every determinant is a candidate key, then that relation is in ________.
    14·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • Imagine that you have access to a class named MyCircle that has void setRadius(double r) and double getRadius() methods. Write a
    14·1 answer
  • Released in 1976, the Apple I was Apple Computer's first product.<br><br> O True<br> O False
    6·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!