1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
14

Francescas spend 25 minutes on the Internet yesterday, if this is 5/6 of the time she spent on the computer, how long did she sp

end on the computer but not on the Internet?
Computers and Technology
1 answer:
astra-53 [7]3 years ago
5 0
She spent 30 minutes on the computer total, so 5 min was not on the internet


You might be interested in
Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) we
inysia [295]
Well can't do it for you but try using that phrase argument with string compare functionality
4 0
3 years ago
What are the two main things an operating system does?
FromTheMoon [43]
Hello,

A computers operating system manages the software and hard ware on the computer.

Thanks for using brainly.
4 0
4 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
What three processor technologies are required to install windows 8?
VashaNatasha [74]
The three processor technologies that are required to be able to install windoes 8 are NX, PAE  and SSE2. PAE stands for physical address extension, NX would NoeXecute and SSE2 means Streaming SIMD Extentions 2. The PAE is the one that enables 32bit processors to be able to access 4 GB and above of memory. NX would help guard the computer from malwares. Lastly, SSE2 is a set of instructions that is used by third party drivers and apps.
5 0
4 years ago
What is the next line?
bazaltina [42]

Answer:

2

Explanation:

because

5 0
3 years ago
Other questions:
  • Microsoft Paint can be described as a digital sketch pad ?
    8·1 answer
  • The wireless spectrum, as defined by the fcc, spans between which two frequencies?​
    7·1 answer
  • Twitter, Foursquare, and other real-time media add to or leverage capabilities of smartphones--improving your ability to be well
    9·1 answer
  • Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
    6·2 answers
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • How can you tell the difference between subnet addresses and interface addresses?
    13·1 answer
  • Which example task should a developer use a trigger rather than a workflow rule for?
    11·1 answer
  • 1.Anong uri ng application software ang iyong ginamit upang makapagtutuos ka ng datos?
    15·1 answer
  • Describe how a black and white image could be represented in binary
    11·2 answers
  • I think i have a virus on my computer what am i supposed to do
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!