1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixas84 [53]
2 years ago
10

Can anyone help my please

Computers and Technology
2 answers:
Makovka662 [10]2 years ago
4 0

order: soil, plant seeds, water, seedling, corn plant

Nat2105 [25]2 years ago
3 0

Answer:

soil , plant seeds , water , seedling , corn plant

Explanation:

You might be interested in
When a computer restarts without a hardware power-down-power-up cycle, it is doing a _______________?
tamaranim1 [39]
When a computer restarts without a hardware power-down-power-up cycle, it is doing an update.
4 0
3 years ago
What is the correct way to set an unordered list to use squares for its list item symbols?
Sindrei [870]

Answer:To create unordered list in HTML, use the <ul> tag. The unordered list starts with the <ul> tag. The list item starts with the <li> tag and will be marked as disc, square, circle, etc. The default is bullets, which is small black circles.

Explanation:sorry if it’s wrong

5 0
3 years ago
I need help please!!?
tensa zangetsu [6.8K]

Answer: C. Shaking hands after a game/contest

Have a nice day!

5 0
3 years ago
Read 2 more answers
To find out what a database contains simply look at the ________ inside the database.
SIZIF [17.4K]

Answer:

10) To find out what a database contains, one can look at the metadata inside the database. 11) Most organizations develop their own database management systems.

4 0
3 years ago
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at
spayn [35]

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

8 0
3 years ago
Other questions:
  • Steve wants to become a successful graphic design entrepreneur. Which entrepreneurial approach will help him succeed? A. working
    14·1 answer
  • Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
    10·1 answer
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • Which social media post indicates your home may be unattended?
    10·1 answer
  • The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
    7·2 answers
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • Who is on ig and would like to be friends?​
    8·2 answers
  • To have a set of command
    6·1 answer
  • Another name of computer program is
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!