1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
3 years ago
13

850 cal into joules​

Computers and Technology
1 answer:
bonufazy [111]3 years ago
4 0

Answer:

3,556.4 Joules

Explanation:

multiply the energy value by 4184

You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
On the basic of size, in how many groups do we classify the computers? Name them.<br>.​
Vedmedyk [2.9K]

Answer:

Computer can be classified into four categories based on size namely Micro, Mini, Mainframe and Super computer

Explanation:

8 0
3 years ago
legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
AlladinOne [14]

Answer:

Elastic IP address

Explanation:

Elastic IP addresses are static, persistent public IP addresses which can be associated and disassociated with the instance, as required.

This will provide the best failover solution that will keep same IP address on a new instance.

6 0
3 years ago
Nhiệt độ chiết rót của máy chiết rót có van trượt là bao nhiêu
Delvig [45]

Answer:

please translate

Thank you✌️

6 0
3 years ago
Gwen has a photo she’d like to display in her speech, but she forgot to digitize it. She only has a hard copy, and she doesn’t h
skelet666 [1.2K]

Answer:

A. Document camera

Explanation:

Document cameras, which are also known as visual presenters or visualisers, digital overheads, or docucams. They are real-time image capture devices for displaying an object to a large audience. Just like an opaque projector, a document camera is able to magnify and project the images of actual, three-dimensional objects, as well as transparencies. They are, simply put, high resolution web cams, that is mounted on arms so as to facilitate their placement over a page.

This makes it easier and convenient for a teacher, lecturer or presenter to write on a sheet of paper or to display a two or three-dimensional object while the audience watches.

In Theory, the document camera can be used to display all objects.

Gwen only needs to place her photo under a document camera and deliver her speech while the image will be displayed for the class.

5 0
3 years ago
Other questions:
  • A user calls your help desk and says that he is trying to configure his Word document so that the text within his paragraphs is
    15·1 answer
  • Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
    5·1 answer
  • An important safety precaution you should take before starting any electrical servicing job is to make sure that your
    15·2 answers
  • Keisha has been asked to give a presentation about a new method for processing customer returns. The first thing she should do i
    11·1 answer
  • Which of the following is the BEST example of a strong password. Question 8 options: brian12kate5 chEwbAccAp!zza w3st! 123abccba
    10·2 answers
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
    7·1 answer
  • What is the function for displaying differences between two or more scenarios side by side?
    11·2 answers
  • 1. What is hydrolics?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!