1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
2 years ago
10

Question 1

Computers and Technology
2 answers:
Julli [10]2 years ago
8 0
Check out the comments i will post it there
Ivanshal [37]2 years ago
3 0

Answer:

Q1. B

Q2. D

Explanation:

You might be interested in
Which actions changed the look of the following word?
Julli [10]
We need to see the word to know what it looks like to answer your question.
3 0
3 years ago
Read 2 more answers
What symbol indicates that material has been copyrighted?
polet [3.4K]

Answer:

Ermmmmmm...

I Think if a thing doesn't hhave a trademark or something like that.

Explanation:

Up there

3 0
3 years ago
Read 2 more answers
Find the place with the greatest number of agency offices of the company.
zavuch27 [327]

Answer:

hope fully this is help full

5 0
3 years ago
With what speed will a clock have to be moving in order to run at a rate that is one-half the rate of a clock at rest
natta225 [31]

Answer:

Speed = 0.866c

Where c is speed of light

Explanation:

We want to find the speed at which it run at a rate that is one-half the rate of a clock at rest.

Thus, we will use time dilation equation to solve it.

Thus;

t_o/√[1 - (v²/c²)] = 2t_o

Where:

t_o is time at rest

v is the speed at which it runs

c is the speed of light.

t_o will cancel out to give;

1/√[1 - (v²/c²)] = 2

Rearranging, we have;

√[1 - (v²/c²)] = ½

Let's make v the subject of the formula;

Let's square both sides to get;

1 - (v²/c²) = ½²

1 - (v²/c²) = ¼

Rearrange to get;

1 - ¼ = v²/c²

¾ = v²/c²

Take square root of both sides to get;

v/c = √¾

v = c × 0.866

v = 0.866c

8 0
3 years ago
Write the importance of data and software security. ​
TEA [102]

Answer:

Safeguarding it from corruption and unauthorized access by internal or external people protects your company from financial loss, reputation damage, consumer confidence disintegration, and brand erosion.

8 0
3 years ago
Other questions:
  • ____ occurs when data is entered into the computer.
    6·1 answer
  • A. Create a console-based application named Desks that computes the price of a desk and whose Main() method calls the following
    13·1 answer
  • A _____ is a basic element that refers to the continuous movement of a point along a surface, such as by a pencil or brush a typ
    9·1 answer
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • a traditional wireless network involving access points that all have wired connections is known as a ?​
    5·1 answer
  • How does violating the SOLID principles make code hard to test?
    5·1 answer
  • Which of the following occupations is the most likely o require working weekends and night shifts
    11·2 answers
  • Based on the strength of the magnetic fields they produce, arrange the solenoids from strongest to weakest
    15·1 answer
  • Which of these is a discipline?
    11·1 answer
  • Libreoffice is an example of which type of software?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!