1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
13

In a food chain are living creatures that eat organisms from a diferente population?

Computers and Technology
2 answers:
SIZIF [17.4K]2 years ago
4 0
Consumer Im thinking. Try consumer and see how it goes
marysya [2.9K]2 years ago
3 0
I’m thinking predator? Or maybe consumer?
You might be interested in
The purpose of a malfunction indicator lamp (MIL) is to:
Serga [27]
C is the right answer
3 0
3 years ago
Why are new versions of applications packages released often ​
stellarik [79]

Answer:

The answer is "new version of application provides more easy to use".

Explanation:

  • In computer science, an application is a program, that is installed on the computer. There are many types of application software, that are "gaming software, working software, programming software, etc." At the end of time users want some new things in software to know users need programmer developed new versions of the software.
  • The update usually improves the device or service in its current version, whilst an improvement is an entirely new version. Installation is usually free and easy. You also have to wait for updates that are difficult to install.
5 0
2 years ago
Before you insert a page break, what should you do? select the font you want to use for the text that comes after the page break
Triss [41]
Put the insertion point where you want the page to break is what I would write.
7 0
3 years ago
Which TWO of these correctly describe a Trojan horse malware?
mina [271]
The first one and last one
6 0
3 years ago
Read 2 more answers
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Other questions:
  • We can see spreadsheet results graphically by creating:
    15·1 answer
  • Bitnet, one of the predecessors of the internet was launched in 1981. what does bitnet stand for?
    12·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • A one-to-many binary relationship allows an occurrence of the entity type on the "one side" of the relationship to be associated
    5·1 answer
  • Briley has all the hardware she needs to construct a fully functional personal computer. She connects the various components and
    7·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
    14·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!