subject
Social Studies, 30.04.2021 15:50 cathydaves

Just like your phone uses a battery for energy, your cells also require energy to work. Do you know what this energy is called? A.
ATP
B.
DNA
C.
Glucose

ansver
Answers: 1

Another question on Social Studies

question
Social Studies, 21.06.2019 23:00
For each of the following, mark whether it is a possible confounder (a factor that mixes up the results, making it look like candy is to blame when it's a causal (or causation) link which supports the argument that candy causes criminal behavior (ie, explains how candy leads to criminality ), or neither (an irrelevant factor, something that may cause people to become criminals but has nothing to do with eating candy). choose your answers based only< on the information given. additives in candy- additives found in candy may adversely affect brain development of young children in ways that could contribute towards adult aggression. impulsive personality-- kids who are highly impulsive and have trouble delaying gratification are more likely to eat candy every day as children and more likely to disobey laws as adults. violent abuse-- children who suffer violent abuse are more likely to become violent adults and commit violent crimes. gender- boys are overwhelmingly more likely to commit violent crimes
Answers: 3
question
Social Studies, 22.06.2019 07:00
How did kenya gain its idpendence in 1963
Answers: 2
question
Social Studies, 22.06.2019 07:20
Based on your approved case, create fictitious digital evidence. you may use logs from your own computer (no personal information) as a guide or search the internet for samples. these samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference. document who, when, and how the evidence was obtained. remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. if necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation. digital evidence must meet each of the following criteria: some of your digital evidence must be retrieved by computer forensics. some of your digital evidence must be retrieved from log files. digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed. present digital copies of your evidence in text files, screen shots, or pdfs.
Answers: 3
question
Social Studies, 22.06.2019 09:00
Rock concerts musical instruments cell phones and contact lenses are just a few things that are possible because of
Answers: 3
You know the right answer?
Just like your phone uses a battery for energy, your cells also require energy to work. Do you know...
Questions
question
Mathematics, 03.08.2021 15:20
Questions on the website: 13722367