1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
2 years ago
12

What is white light?

Computers and Technology
2 answers:
maw [93]2 years ago
8 0

Answer: Read explanation:

Explanation:

Im doing this for badges, good luck tho

LenKa [72]2 years ago
5 0

Answer:

<em><u> </u></em><em><u>White light is when all colors are reflected.</u></em>

<em><u>thank</u></em><em><u> </u></em><em><u>you</u></em>

You might be interested in
can somebody please explain to me why I woke up today to see that all of my 40 answers where deleted ? like what I spent hours
Alina [70]
Same on my other account
They took my brainly and my answrs
Left me with thanks and a lil point
What going on???
4 0
3 years ago
Read 2 more answers
Explain why the process of sketching in engineering might resemble a loop or a cycle.
Valentin [98]

Answer:The process of sketching in engineering might resemble a loop because of the design process.

Explanation: The design process is a loop or cycle to improve a design. So, sketches will be shown to other engineers and they will improve on the design until it is effective and efficient.

6 0
3 years ago
Read 2 more answers
TRUE OR FALSE:
Yuki888 [10]

Answer:

True

Explanation:

I just know the answer because I'm a genius hehe

3 0
2 years ago
5. Why would you want to wear white or light colors on a summer day?
vfiekz [6]

A. White absorbs all light and reflects none so it is cooler.

3 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Other questions:
  • A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device.
    7·2 answers
  • Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
    8·1 answer
  • Convert the following pseudocode to C++ code. Be sure to define the appropriate variables. Store 25 in the speed variable. Store
    5·1 answer
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable
    6·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
  • You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
    9·1 answer
  • Which one did I buy the iPhone 13 or the Samsung S22 Ultra?
    14·2 answers
  • What are tasks performed by pascaline?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!