1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
2 years ago
12

2. Name the substance you think is in the cylinder that you cannot see and prevents the plunger from going all the way in even w

hen you push the plunger hard?​
Computers and Technology
1 answer:
V125BC [204]2 years ago
5 0

Plunger is a disc or cylinder that moves in the body of a syringe, a pump or the cylinder of a steam engine, an explosion engine.

<h3>The substance in the cylinder</h3>

The substance that you think is in the cylinder that you cannot see and that prevents the plunger from going all the way in, even when you push the plunger hard, it may be substance that is too viscous or dense, but it is not possible to determine substance.

With this information, we can conclude that the plunger is a disc or cylinder that moves in the body of a syringe, but the substance to be determined can be viscous or dense.

Learn more about plunger in brainly.com/question/4190018

You might be interested in
Software, also called a(n) ____________________, consists of a series of related instructions, organized for a common purpose, t
Naddika [18.5K]
Software is also called a program or an application.
8 0
3 years ago
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk
KengaRu [80]

Answer:

B) wireless local area network (WLAN)

Explanation:

WLAN which fully meaning is WIRELESS LOCAL AREA NETWORK is a network provider that enables two or more mobile phone user , desktop or computer user to connect and have access to the internet by simply connecting to the local area wireless network and this type of wireless network are more cheaper to install.

Example of where WIRELESS LOCAL AREA NETWORK can be found are : School building, Office building, School campus, home, among others.

4 0
3 years ago
6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.
matrenka [14]

Answer:

A.

Explanation:

Encrypting File System (EFS) is a file system which enables you to encrypt files, thus making them unviewable by any account but your own.

6 0
3 years ago
When sending emails and setting goals, you want to go beyond checkpoints of activities for your goals. What are examples of chec
yulyashka [42]

Answer:

Open and click rates

Explanation:

Open and click rates are measuring units of how well your campaigns perform.

8 0
3 years ago
Other questions:
  • When you enable user access control (uac)
    11·1 answer
  • It is okay to use a dust rag when cleaning the inside of a computer.
    9·2 answers
  • Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
    14·1 answer
  • Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D
    7·2 answers
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
    5·1 answer
  • Which elements are visible when a user opens a new PowerPoint presentation?
    7·2 answers
  • im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
    7·2 answers
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!