1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
15

What group both contains primary and secondary consumers

Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
7 0

Answer:

i'm sure this question goes in biology

You might be interested in
Which function in Ecels tells how many numeric entries are there​
goldenfox [79]

Answer:

CHKNUM is the answer

Explanation:

good luck

4 0
3 years ago
Read 2 more answers
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
m_a_m_a [10]

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

<u>Determine status flags that are on after performing </u> 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

8 0
3 years ago
Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy
KatRina [158]

Answer:C

Explanation:

5 0
3 years ago
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
MakcuM [25]

cataloging, that is a term for it.

3 0
3 years ago
Other questions:
  • Cable television systems originated with the invention of a particular component. What was this component called?​
    9·1 answer
  • Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likel
    14·1 answer
  • "The study of how changes in the input parameters of a linear programming problem affect the optimal solution is known as
    8·1 answer
  • I have to writea piece of code to calculate the factorial of somewhat large numbers so the long long type won't suffize, so usin
    7·1 answer
  • What is the main role of LDAP?
    14·1 answer
  • Which statement does not describe the guidelines for the use of text in presentation programs?
    7·1 answer
  • B) Develop a truth table for expression AB+ C.
    10·1 answer
  • Suppose the size of process is 10000 bytes and the relocation register is loaded with value 5000 which of the following memory a
    15·1 answer
  • What dod instruction implements the dod cui program
    14·1 answer
  • write sql commands for the following: a. create two different fom1s of the insert command to add a student with a studen t id of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!