1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
2 years ago
5

You are choosing between two different window washing companies. The first charges $5 per window. The second charges a base fee

of $40 plus $3 per window. Based on this information, the second company is cheaper if you have more than ______ windows.
Computers and Technology
1 answer:
tatiyna2 years ago
8 0

Answer:

20

Explanation:

You might be interested in
Convert 105 decimal to 128 binary form
krok68 [10]

Answer:

1101001 is binary 105

128 in binary is 10000000

6 0
2 years ago
Which of the following are best and safe practices for shutting down a computer or disconnecting a device? Check all of the boxe
Mademuasel [1]
D and A because in order to be safe you need to unplug it to be safe
6 0
3 years ago
Read 2 more answers
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
4 years ago
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow
coldgirl [10]

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

8 0
3 years ago
Digital manufacturing has impacted our world today! List a reasons why.
Maru [420]
Because we can get manufacturing faster than usual
6 0
4 years ago
Other questions:
  • People with healthy media diets:
    12·1 answer
  • How to build an arch bridge​
    5·1 answer
  • If you're using your keyboard, what actions are you most likely performing in Access?
    15·2 answers
  • What invention was key to computers being moved into homes and personal use?
    10·2 answers
  • Which examples are relevant sources for students to use in research?
    6·1 answer
  • What is the best way to appeal to an audience in any medium ?
    11·1 answer
  • C++ Code Outputs.
    9·1 answer
  • which driver must be running and configured to enable a PC to communicate with a CompactLogix PLC on an Ethernet network
    10·1 answer
  • Select the correct text in the passage.
    12·1 answer
  • A for loop
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!