1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
2 years ago
11

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budd

ing
Computers and Technology
1 answer:
Olegator [25]2 years ago
8 0
Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting
You might be interested in
A strong example of using keywords would be a. Using “good” to remember the word “hideous” c. Both of these b. Using “hide” to r
posledela

The answer to the question you have asked is <u><em>"B" . </em></u> Because if you really think about it, there is no possible way that "Good" can be a keyword of "Hideous".

6 0
3 years ago
A string that contains only 0s,1s, and 2s is called a ternary string. How many strings of 10 ternary digits (0, 1, or 2) are the
alexdok [17]

Answer:

Number of strings = (10, 2)×(8,3) = 2520

Explanation:

The number of possible combinations for taking two 0's is C(10, 2)

It remains 8 Positions

The number of possible combinations for taking three 1's is C(8,3)

So there remains 5 spots

8 0
3 years ago
Read 2 more answers
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
Education leads to higher wages lower unemployment.* True or false
natta225 [31]

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

5 0
2 years ago
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
Other questions:
  • Pls help brainliest
    12·1 answer
  • A ________ allows users to add, remove, or edit its content.
    10·2 answers
  • Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
    11·1 answer
  • Design the logic for a program that allows a usher to continuously enter numbers until the usher enters 0. Display the sum of th
    9·1 answer
  • The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
    8·1 answer
  • Edhisive 3.5 code practice
    9·1 answer
  • Four reasons why computers are powerful
    14·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • Ask how many apples the user wants. Ask how many people the user will share the apples with. Find out how many apples will remai
    7·1 answer
  • According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!