1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
11

The color band that represents tolerance on a resistor is the?

Computers and Technology
1 answer:
sashaice [31]3 years ago
3 0
The color band (that stands for tolerance)on a resistor is gold.
You might be interested in
Your company's IT management team is looking for an online tool to provide recommendations to save money, improve system availab
alina1380 [7]

Answer:

AWS Trusted Advisor

Explanation:

The IT management team can choose to host their system in Amazon Web Service (AWS) and utilize the AWS Trusted Advisor service to manage the resources. AWS Trusted Advisor is an online tool offered by Amazon to provide guidance to their client to manage the cloud resources by following some recommended good practices. This can save cost, improve system availability and performance and also to improve system security. AWS Trusted Advisor provide recommendation in real time and on regular basis. It will scan a client's subscribed cloud-based infrastructure and provide recommendation actions in five aspects which are cost optimization, performance, security, fault tolerance and service limits.

6 0
3 years ago
What effect on total current flow will a shorted series component have in a series-parallel circuit?
Citrus2011 [14]
Im going to go with D on this one but dont rely on my answer this is just a  educated guess

7 0
3 years ago
By the 1990s, ______________ technology enabled one person operating a desktop computer to control most—or even all—of these fun
snow_lady [41]

Answer: D. Digital

Explanation:

By the 90s many changes were been seen in the global market where we had the digital technology glowing and the flourishing of digital devices which enabled a person to operate desktop computer and many others stuffs

one such contribution of digital technology can be seen in the field of printing machines where we had photooptical printing machines. These machines uses the energy of the photons to allow a beam of light to strike a material but as the digital age started it allowed using computer controlled lasers to photosensitize  printing drums whereby static electricity is laid on the surface of the drum. This technology enables full color press sheets possible.

8 0
4 years ago
Read 2 more answers
You can use the ________ method to replace an item at a specific location in an arraylist.
r-ruslan [8.4K]
The answer is the <span>ArrayList method</span>
7 0
3 years ago
Salvado has a flash dish of is GB
exis [7]

Answer:

About 1,655 files or exactly 1655.646315789473684210526315785

1578

Source(s):

1.5 gb = 1,500 mb<---wrong right --->1536

Explanation:

6 0
3 years ago
Other questions:
  • The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis befo
    14·1 answer
  • Write a for loop to populate vector userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and
    7·2 answers
  • When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
    8·1 answer
  • You can use the windows ________ to check on a nonresponsive program
    12·1 answer
  • Explain how touch-tone dialing sends digits to the switch and write the name given to define touch-tone dialing.
    10·1 answer
  • What's a computers C hard drive
    13·2 answers
  • A Color class has three public, integer-returning accessor methods: getRed, getGreen, and getBlue, and three protected, void-ret
    14·1 answer
  • Which of the following is not a method of the history object?
    11·1 answer
  • A solid weighs 20gf in air and 18gf in water .find the specific gravity of the solid​
    12·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!