1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
3 years ago
10

Chole enjoys her math classes, and she would like to find a career that will allow her to continue use her math skillls which ca

reer would be a good fit for her
Computers and Technology
1 answer:
MrRa [10]3 years ago
8 0
Pery tech is where im at they have a great math class
You might be interested in
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
Ilia_Sergeevich [38]

Answer:

a. 0x00001844

Explanation:

When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.

8 0
3 years ago
Indonesia is planning to move its capital from Jakarta to the island of Borneo in the hope that the burden of congestion, regula
JulijaS [17]

Answer:

Indonesia's capital has just been relocated from Jakarta to a site within the jungle of Kalimantan on Borneo island after parliament approved the bill. It will strengthen supply chains and place Indonesia "in a more strategic position in world trade routes, investment flows, and technological innovation."

Explanation:

mark as brainiest

6 0
3 years ago
Read 2 more answers
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
Write steps of the following operations.<br>a. applying borders and spacing<br>b. create a folder​
slava [35]

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

7 0
3 years ago
Web and mobile applications are programs in which all or some parts of the software are downloaded from the web each time it is
Ber [7]
True,because a browser requires a constant connection to internet to get its information for the what ever the program is. and mobile devices now these days requires you to be login to your mobile stores in order to play or download your program.
8 0
4 years ago
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • I am having trouble with logic gates(AND NOR,etc)
    8·2 answers
  • The integer variables first and last have been declared and assigned values (with last &gt;= first). Allocate an integer array t
    10·1 answer
  • What does a converter do? A. It converts one technological system into another. B. It converts one type of electrical signal int
    10·2 answers
  • Write a method intersect that accepts two sorted array lists of integers as parameters and returns a new list that contains only
    8·1 answer
  • Write the Java code to simulate an inventory control system and a point of sale system with customer history On program start, e
    5·1 answer
  • The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura
    8·1 answer
  • Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
    9·1 answer
  • What is a zerø-day exploit? No go.ogle &gt;:(
    10·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!