Answers

Answer 1
The answer is 324.6 I hope that it helps if not I am so sorry ❤️
Answer 2

Answer:

335.7

Explanation:

you would get this 100 + 100 + 100 + (4 / 6) + 15 + 20 =  

335.666666667 so then you have this 335.66 and the 6 is higher than 5 so the other 6 will be a 7 so you get 335.7


Related Questions

what is a core hardware and distribution hardware

Answers

Answer:

The term “core hardware “ is merely a reference to the minimum physical hardware requirements for a given application to run to benchmarks established by the programmers.. DISTRIBUTION HARDWARE.. Electrical Distribution Hardware for the Energy Industry

A machine used as a holding area for implements after they have been properly disinfected is called a(n):

Answers

Answer:

UV light sterilizer

Explanation:

Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his computer and help it function properly?

Answers

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

Answer:

Utility software

Explanation:

Joe's computer crashed and I was looking for a replacement which of the following criteria is less important.Ram,money, color, usage ​

Answers

Answer:

color

Explanation: nobody cares what color it is how it works

Colour is the less criteria as Joe's computer crashed, and he was looking for a replacement. Hence, option C is correct.

What is meant by computer crashed?

A computer crash occurs when an operating system or program stops functioning properly. When: Hardware has had an irreparable failure.

Computer crashes are the result of hardware or operating system errors. Even though software errors are unquestionably more common, hardware errors can still be quite harmful and are more difficult to spot. A computer cannot function if certain hardware components are malfunctioning.

A crash or system crash occurs when a computer program, such as an operating system or software application, stops functioning properly and exits. A computer cannot operate without a number of hardware parts working properly.

Thus, option C is correct.

For more details about  computer crashed, click here:

https://brainly.com/question/4701800

#SPJ2

What is output?
C = 1
sum 0
while (c < 10):
c = c + 3
sum
sum + C
print (sum)

Answers

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

The contains the computer's "brain," the central processing unit (CPU).

Answers

Answer:

Inside the computer case, on the motherboard. Hope this helps!

Explanation:

The flowchart that show the sequence of logical operations executed by a computer is called a: A. Systems flowchart B. Operations flowchart C. Program flowchart D. Decision flowchart

Answers

Answer:

It is called a Program Flowchart.

Explanation:

Software is glving Instructions so that text is displayed on the monitor. This software is an example of
application software
programming software
system software
programming language

Answers

Answer:

System software

Explanation:

Because it shows what you have typed into the computer

Answer:

programming software

Explanation:

because programming software well show in text what you need to do

Question 2 and 3 answer

Answers

Answer:

3=if you want to highlight text, move a cursor to the start of the line,hold the shift key, and then press a down arrow

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Answers

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

A script kiddie is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so.

What is a script kiddie?

A script kiddie, or “skiddie,” is known to be when a person is said to lacks programming knowledge and often uses existing software to bring about an attack.

Therefore, A script kiddie is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so.

Learn more about script from

https://brainly.com/question/2438409

#SPJ9

Match the following
image editing software
Web browsers
Computer Aided Design, or the use of software to aid in
1,
technical drawings and models
2. Information processed or stored by the computer
3. software that organizes a collection of data
also known as graphics software, this software enables a
4.
person to change or create visual images on a computer
fields on a screen used to search for specific information in a
5.
database
CAD
query
Web page
dota
6. Software used to browse the World Wide Web
a page on the World Wide Web that may contain text,
7
Images, audio, or video
database

Answers

Answer:

4

Explanation:

because your wanting something that's well edit an image

________ information systems are supposed to improve care by using computers to manage charting, staff scheduling, and the integration of clinical information.

Answers

Answer:

The answer is "Nursing".

Explanation:

The term NIS stands for the "Nursing Information System". It is a computer system, that manages medical information from a wide range of medical settings.

It also provides care with a reliable and organized manner to enhance the care of the patient. It also helps to manage the administrative activities like control for workloads, maintaining personnel records, and scheduling changes.

adding transition slides to a presentation

Answers

Answer:

1. Select the slide you want to add a transition to.

2. Select the Transitions tab and choose a transition. Select a transition to see a preview.

3. Select Preview to see what the transition looks like.

To remove a transition, select Transitions > None.

Can anyone help me
I will make you a brainalist

Answers

Answer:

Explanation:

Exercise A:

1. A table.

2. Categorical.

3. Access.

4.Queries.

5.ACCDB extension.

Exercise B:

1. Insert Tab.

2. DoCmd.Quit method.

3.Navigation Pane.

4. Modify table data.

5.The top pane and the bottom pane.

Hope this helped you!

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

The questions are from HTML. State whether the following statements are true or false. 1. HTML is the programming language. 2. Web page is the collection of website. 3. <marquee> tag is used to link the Hyper text. 4. Heading tag supports different levels from H1 to H6. 5. Attributes provide additional information to the HTML tags. 6. Empty tags must be closed with ending tag </>. ​

Answers

Answer:

true

Explanation:

hope this helps

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *
10 points
Application software
System software
Open-source software
Proprietary software

Answers

Answer:

Open Source software.

Answer:

open source software

Explanation:

Keira wishes to record a song in the comfort of her home. She has a computer and a guitar. Which other device does she need to record her song?

Answers

Answer:

A microphone

Explanation:

You need a microphone to record sounds otherwise the computer will not be able to input the song.

Answer:

Microphone!

Explanation:

Just got it right

How long are objective tests for FBLA-PBL events? Apex

Answers

Answer:

You will have 60 minutes to complete all objective tests. Each test has 100 multiple choice questions.

Explanation:

60 minutes to complete the objective test

Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.
makeOutWord("<<>>", "Yay") → "<>"
makeOutWord("<<>>", "WooHoo") → "<>"
makeOutWord("[[]]", "word") → "[[word]]"

Answers

Answer:

The following are the answer to this question.

Explanation:

In the given code, a "makeOutWord and word" is already used to hold some value. In this code, we define a string method "makeOutWord" that accepts two string variables "out and the word" in its parameter.

Inside the method, a return keyword is used that uses the string variable "out and the word" with the "substring" method, this method is used to returns a new string from an old string value, and it also uses the "word" string variable for the return value.  

please find the attached file for code:

Can you get accurate
information from social
media?
A. Sometimes
B. Usually
C. Always
D. Nevali

Answers

Answer:

The answer is B.usually

Explanation:

We usually get accurate information from social media cause sometime they also tell us the fake news...

Yes, it is possible to get accurate information from social media "sometimes" (Option A)

How accurate is the information gotten from social media?

The accuracy of information obtained from social media can vary widely.

While social media platforms can be a valuable source of news, updates, and insights, the information shared is often user-generated and may not always be verified or fact-checked.

Therefore, the accuracy of information on social media is not guaranteed, and it is essential to cross-reference and verify information from reliable sources before considering it as entirely accurate.

Critical evaluation and discernment are crucial when using social media as an information source.

Thus, Option A is the right answer.

Learn more about social media at:

https://brainly.com/question/1163631

#SPJ6

where can I watch all harry potter movies for free?
and I know this isn’t exactly the question I should be asking here but pls help me and don’t give me virus

Answers

Answer:

Ive streamed them before on DailyMotion

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Answers

Answer:

extranet

Explanation:

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

​ In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system.

Answers

Answer:

Systems analysis phase.

Explanation:

In a systems development life cycle (SDLC) model, the purpose of the systems analysis phase is to build a logical model of the new system.

In the systems analysis phase, the system developer examines or analyzes the information or data about the requirements of an end-user, which are then implemented to achieve the organizational set goals and objectives.

Hence, systems analysis refers to the process of gathering data or factual informations, understanding processes, problem identification and suggestions of probable solutions for an effective and efficient functioning of the system.

By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. A) identity thieves B) keyloggers C) hackers D) cyberstalkers

Answers

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

what is considered an input and output peripheral?

Answers

Answer:

An input is any device that can put information into a computer, (keyboard, mouse, microphone, etc.) An output will take information out, (monitor, printer, speaker, etc.)

It is implied in the AMS Climate Paradigm that components of Earth’s climate system (e.g., atmosphere, hydrosphere, cryosphere, geosphere, and biosphere) interact in a(n) ________ way as described by natural laws.

Answers

Answer:

orderly

Explanation:

The American Meteorological Society presents information, development, and an interdisciplinary approach towards the researches of atmosphere and hydrosphere. The goal of the society is intended towards developing a research-based idea covering the topics of atmosphere and science. The atmosphere, hydrosphere, cryosphere, geosphere, and biosphere are the components of the environment that helps in determining and analyzing the climatic condition of the Earth.

evolution of new technology also increased the crime in our society explain​

Answers

Answer:

yes ,for sure evolution of new technologies also increased the crime in our society. Many cyber crime are occurring due to the use of new technologies. People can hack the data , transfer money from others account and so on . People are using new technology to harm others ,steal others data and information . It has given an opportunity to many people to do various crime easily .

Nina's grades could be better. She gets about five hours of sleep every weeknight and ten hours per night on weekends. How much sleep should she get to better concentrate on schoolwork? Five to six hours every night nine to ten hours every night a total of forty hours a week a minimum of eighty hours a week

Answers

Answer:

B. Nine to ten hours every night

Explanation:

You need to have at least 8 hours of sleep and B makes the most sense cause then she gets enough sleep and enough time to study.

Answer:

9 to ten hour

Explanation:

Two fingers are assigned to six letters each. What fingers are they?

Answers

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

Other Questions
What would be the best control group for global warming Please solve for a ! 24+5a=-a+6(5a-4) True or false: Changes that occur at puberty affect only the physical aspects Write an implicit sentence about a storm and car parked near a tree. A scientist has two kinds of solutions. The first solution is Solution A, which is an $80\%$ acid solution. The second solution is Solution B, which is a $30\%$ acid solution. (a) Find the amount of Solution A (in mL) that must be added to $500$ mL of Solution B in order to produce a $70\%$ acid solution. (b) Find the amount of Solution A and Solution B (in mL) that can be combined in order to form a $100$ mL solution that is $50\%$ acid. (c) Does there exist a combination of Solution A and Solution B that is $90\%$ acid? Which two genotypes in an individual would be expressed as the same phenotype in a diploid organism? A Lotus will travel 275 meters in 4.71 seconds. What is this car's average speed? Pinky's science fair project in junior high focused on an observation that the Crickets outside her window chirp less frequently when the temperature was colder if data was collected consisting of the averge number of cricket chirps at different temperatures in her backyard which varible would be the independent variable Driving at 75 m/s, you hit the brakes on your new car, accelerating ata rate of -20 m/s2. How much time will it take the car to come torest? What are some real life examples of revolution In a particularclass of 22 students, 10 are men. What fraction of the students in the class arewomen? A car accelerates from a rest at -3 m/s2. What is the displacement after 4.7 sec? PLZ HELP ME ! Solve for k The exploration of the Oregon trail and the Wild West are actually split in time by what major event A company's overhead rate is 60% of direct labor cost. Using the following incomplete accounts, determine the cost of direct materials used. Goods in Process Inventory Finished Goods Inventory Beg. bal 100,800 Beg. bal 118,200DM? 324,800 301,000D.L?O.H? F.G? End Bal. 131.040 End Bal. 142,000 Factory Overhead 93,240 90,720 The next model of a sports car will cost 12.9% more than the current model. The current model costs $35,000. How much will the price increase in dollars what effect does exersise have on the nervous system A ski lift has a one-way length of 1 km and a vertical rise of 200 m. The chairs are spaced 20 m apart, and each chair can seat three people. The lift is operating at a steady speed of 10 km/h. Neglecting friction and air drag, and assuming that the average mass of each loaded chair is 250 kg, determine the power required to operate this ski lift. Also, estimate the power required to accelerate this ski lift in 17 s to its operating speed when it is first turned on. NEED HELP, QUICK!Which statement is true? O If you practice failing, you will get good at failing. O 7th and 8th grade don't count so it is okay to fail my classes. O What I learn in 7th and 8th grade won't help me in high school. O Teachers won't help you in 7th grade since you are older and have to be independent. Consider the composite function g (f (x)) = x StartRoot 6 EndRoot. If f(x) = 3x2, what is g(x)? g (x) = StartRoot 2 x EndRoot g (x) = StartRoot x + 3 EndRoot g (x) = StartRoot 6 x EndRoot g (x) = StartRoot 9 minus x EndRoot