1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
2 years ago
8

The grade of a metric bolt is designated by

Computers and Technology
1 answer:
Andre45 [30]2 years ago
5 0
The answer to your question is The grade of a metric bolt is designated by the number stamped on the head of the bolt.
You might be interested in
What percentage of teens plays video games?<br><br> A.97%<br> B.100%<br> C.74%<br> D.50%
inna [77]

Answer:

This would all depend on what kind of video games you are talking about, most people would say that playing on you phone is like playing a game on a console or a PC.  

most kids do play on these three things, so I'm going to go with answer choice C.

Explanation:

Reason why is because just like there are many who play, there are many who don't. I being one who prefers to read would like to make it known that not all teens do play video games, and that there are plenty of those who would rather do something productive.

7 0
3 years ago
Read 2 more answers
Give a big-O estimate for the number additions used in this segment of an algorithm.
rjkz [21]
Big-O notation is a way to describe a function that represents the n amount of times a program/function needs to be executed. 

(I'm assuming that := is a typo and you mean just =, by the way) 

In your case, you have two loops, nested within each other, and both loop to n (inclusive, meaning, that you loop for when i or j is equal to n), and both loops iterate by 1 each loop.

This means that both loops will therefore execute an n amount of times. Now, if the loops were NOT nested, our big-O would be O(2n), because 2 loops would run an n amount of times.

HOWEVER, since the j-loop is nested within i-loop, the j-loop executes every time the i-loop <span>ITERATES. 
</span>
As previously mentioned, for every i-loop, there would be an n amount of executions. So if the i-loop is called an n amount of times by the j loop (which executes n times), the big-O notation would be O(n*n), or O(n^2). 

(tl;dr) In basic, it is O(n^2) because the loops are nested, meaning that the i-loop would be called n times, and for each iteration, it would call the j-loop n times, resulting in n*n runs.

A way to verify this is to write and test program the above. I sometimes find it easier to wrap my head around concepts after testing them myself.
3 0
3 years ago
The most commonly used network topology where network endpoints connect to a central device is called
arsen [322]
That would be a star network. A star network isn't necessarily shaped like a star, of course, but like you mention this topology has a central device, usually a server of some sorts, and then many different endpoints coming out of that central device, such as the client computers for the server.
6 0
3 years ago
I had no computer-related problems.
padilas [110]
Ummmmmmm A, agree???
8 0
3 years ago
Read 2 more answers
Pls help!!!!!!!!!!!!
son4ous [18]

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

5 0
3 years ago
Other questions:
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Write a MIPS assembly language program that
    11·1 answer
  • How does virtualization factor into a layered vs. non-layered design discussion?
    14·2 answers
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • Encryption is an important topic in math and computer science. It keeps your personal information safe online.
    6·1 answer
  • Opinion on sandshrew​
    13·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • The method used to transfer information to far off place instantly is called​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!