1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
1 year ago
3

Peter has a box containing 65 red and blue balls. Counting them, he realizes that there is a ratio of 3 red balls to 10 blue bal

ls. How many blue balls does he have in total?
Computers and Technology
1 answer:
Citrus2011 [14]1 year ago
8 0
The answer would be 5 because elf the amount of blue and red balls
You might be interested in
Can the teacher provide your feedback through Google Classroom?
ella [17]

Answer:

Yes

Explanation:

The teacher always answers all queries if she/he is online and the question u ask is understandable

4 0
3 years ago
Read 2 more answers
Use the paragraph underneath to answer the four questions.
Xelga [282]
Wow...that’s a long paragraph
8 0
3 years ago
Is it appropriate to send an email and call the individual the same day to ask if they have received your email?
rosijanka [135]

Answer: Its not appropriate to call the same day, probably the next day you can call, if they don't respond because that person could have been working the whole day and have not got a chance to read or see your email.

Explanation:

8 0
3 years ago
Read 2 more answers
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Mha ship what yo fave
Diano4ka-milaya [45]

Answer:

umm the first one I think..? lol

4 0
3 years ago
Read 2 more answers
Other questions:
  • You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning ab
    10·1 answer
  • Im trying to figure out how to write a program that finds prime factors of a number. I have the following but it only works for
    12·1 answer
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Houston want to have a quick conversion with his friend about an upcoming school activity. which type of website would be most u
    12·2 answers
  • Why is printer an output device​
    14·2 answers
  • ¿ cuales son las características de revolución industrial?
    11·1 answer
  • A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
    14·1 answer
  • Analyze the map below and answer the question that follows. A topographic map of Northwestern Russia. Areas on the map are circl
    13·2 answers
  • Put Your Zom Here If You In Zom
    6·2 answers
  • Mention the usage of crop concept in ms-word​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!