1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
4 years ago
9

A bin contains 100 sty le a notebooks, 100 style b notebooks, and 100 style c notebooks. antoine will select 3 notebooks from th

e bin. how many different selections of 3 notebook styles are possible?
Computers and Technology
1 answer:
emmasim [6.3K]4 years ago
7 0
<span>The answer is Ten.  Substituting numbers for letters, available selections are 111, 112, 113, 122, 123, 133, 222, 223, 233, 333.  Note that, for example, 112, 121, and 211 are considered as the same selection.
</span>AAA, BBB, CCC, <span>AAB, AAC, </span><span>BBC, </span><span>ABB, ACC, </span><span>CCB & ABC.</span>
You might be interested in
What is a written or electronic document that outlines etiquette policies for using networks and network resources?
daser333 [38]

Acceptable Use Policy is a written or electronic document that outlines etiquette policies for using networks and network resources.

Therefore, the answer is Acceptable Use Policy.

3 0
3 years ago
Students working at individual PCs in a computer laboratory send their files to be printed by a server that spools the files on
Vanyuwa [196]

Answer:

Explanation:

Disk space is a limited resource on the spooling partition and once it is filled the will cause a deadlock. Every single block that comes into the spooling partition claims a resource, and the one behind that wants resources as well, and so on. Since the spooling space is limited and half of the jobs arrive and fill up space then no more blocks can be stored, causing a deadlock. This can be prevented allowing one job to finish and releasing the space for the next job.

5 0
3 years ago
What is returned by the code: range (20, 100, 20)
Tju [1.3M]

The code that is returned by the code: range (20, 100, 20)  is known as  (20, 50, 80).

<h3>What is this code about code?</h3>

The line of code is known to be one that often returns the ASCII code as the ASCII is known as American Standard Code for Information Interchange.

Note that the code is made up of   seven bit code and thus the code returned for range (20, 100, 30) is (20, 50, 80).

Learn more about code from

brainly.com/question/20796198

#SPJ1

8 0
2 years ago
Which sentence is an example of constructive statement
creativ13 [48]

Answer:

Which sentence is an example of a constructive I statement? “I think you are lazy; you never complete any work on time.” “I think you handled the problem in a very clever way.” “I feel stupid because I don't speak English well and can't converse with anyone here.”

Explanation:

5 0
4 years ago
How Mobile App work? Explain​
Marat540 [252]

Explanation:

Mobile Applications are moving away from the embedded software systems normally found on PCs.Instead,each application provides limited and isolated functions,such as a game,a calculator or mobile web browing.

8 0
3 years ago
Other questions:
  • Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networki
    5·1 answer
  • What is the first step that you should undertake when performing a visual analysis of a work of art?
    6·2 answers
  • Consider this program: Cost1 = input("Please enter the first expense: ") Cost2 = input("Please enter the second expense: ") prin
    6·1 answer
  • What is a cell in computers
    7·2 answers
  • Solid state components are less likely to fail because they:______.a. are driven by precise sets of software instructions. b. ha
    8·1 answer
  • In which stage of investigation does a digital forensics expert perform self-assessment?
    11·2 answers
  • Your dad just gave you his old computer running Windows 7. You want to see how many volumes are contained within it. Which tool
    10·1 answer
  • Which of these examples demonstrate portfolio income?
    13·2 answers
  • Key
    6·1 answer
  • Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, ri
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!