1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
11

What is the utility of a lever?

Computers and Technology
2 answers:
OlgaM077 [116]3 years ago
6 0
To make objects easier to lift
Kamila [148]3 years ago
3 0
Muy cosas.
 fazer una montanha russa andar,ativar una armadilha, ativar una puerta etc.
You might be interested in
15. How many PC’s can be connected to a UPS?
Alex_Xolod [135]

Answer: Depends on the power of the computer /computers and the UPS

Explanation: For someone who had a big connected network of computers and printers we would plug the computer or server into the UPS as well as the monitor and sometimes a printer sometimes the monitor was plugged into the wall

When you get a UPS you must plug it in for a certain time could be hours or even a day.  A USP has a big battery in it and you must charge it (sometimes it comes semi-charged but you must plug it in to strengthen it. )

there are two connector wires that you affix to the battery and you must put a lot of strength into it to make it secure.

So in closing, you can get away with two like a desktop and a laptop.

Read your documentation that comes with the UPS

6 0
2 years ago
How do you change the font in html?<br>&lt;______&gt;google sans"google sans font"&lt;/______&gt;
Allisa [31]
What do you want inside font colour,text,or face
7 0
3 years ago
Please
Andrew [12]

Answer:

C. 2^16

Explanation:

In Computer Networking, there are five (5) classes of IP addresses, these include;

- Class A

- Class B

- Class C

- Class D

- Class E

The various classes of IP address are represented by the value of their first octet. The first octet value of Class B is 128-191 with a subnet mask of 16.

Hence, from the IP address 149.130.x.y where x and y are 8-bit numbers. The x and y equals 16-bit numbers.

Thus, 2^16 devices can connect to the Wellesley network before we run out of IP addresses.

3 0
3 years ago
Type the correct answer in the box. Spell all words correctly. What measures should organizations implement so that confidential
miss Akunina [59]

Answer:

Proper Authentication is required. Not all the people should get all the data. If this is the case then you are definitely going to find that data protection is breached. We need to define each user's role as well as privileges clearly or else we are definitely going to suffer. Always ensure proper authentication.

Explanation:

We need to define each user's roles and privileges. And that can be done through Authentication and Authorization,

8 0
3 years ago
Which strategy would most likely improve a student's reading comprehension?
Fynjy0 [20]

Answer:

I think asking questions is the best.

Explanation:

I believe asking questions are the best because you get to understand the text which is really good. Some 7th grade reading teachers can help you a lot and you can use iLit to help a bunch.

8 0
3 years ago
Read 2 more answers
Other questions:
  • An electronic resume is a plain-looking document. True of False?
    6·2 answers
  • What is the QOS model?
    6·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
    12·1 answer
  • Bytes are typically represented with a lowercase b and bits with an uppercase B.<br> true or false
    7·1 answer
  • What is social media ​
    13·2 answers
  • Write an algorithm that accepts two numbers,
    7·1 answer
  • Light the<br> Spark hop<br> Answer if ur a baddie;)))
    9·2 answers
  • Which task can be completed with the Template Organizer?
    12·2 answers
  • Design a program takes as input, X, an unsorted list of numbers, and returns the sorted list of numbers in X. The program must b
    12·1 answer
  • Write a C function named apply_all that expects two arrays of integers and their sizes and dynamically allocates a new array of
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!