1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
14

How long will twenty percent of battery life last me?

Computers and Technology
2 answers:
Ghella [55]3 years ago
5 0
About one or two hours.
MrRissso [65]3 years ago
5 0
It depends the amount of applications are currently running on your phone if you are running an average of 3 apps and keep brightness to a minimum and have battery save mode an average of 49-97 minutes 

You might be interested in
How is informatics affecting banking and financial institutions?
Vadim26 [7]

Informatics is one of the sub-child of Information engineering. It is an “applied form” of information. Financial industry normally face changes with handling data. Data might be scattered in several system and the data feed takes more time and effort and also collecting all the data, analyzing and processing those is still more tedious.

Banking informatics helps the financial sector to have an ease with data feed, collect data and generate report quickly, easily and effectively. This is an essential and useful tool for the Banking and financial institutions.

6 0
3 years ago
2. You have noticed over the past several days that your computer is running more slowly
xenn [34]

Answer:

probably to many tabs open or take it to a shop

3 0
3 years ago
Read 2 more answers
When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
Sergeeva-Olga [200]

Explanation:

Here's my solution:

import java.util.Scanner; // We start by importing the Scanner, which enables us to put in values

public class Main // our class. Name doesn't really matter here.

{ // Open the brackets of the class.

   

public static void main(String[] args) { // This is our main method. It will run when we run the class.

    System.out.println("Starting Taffy Timer..."); // When we start the timer, we will print out that we do so

 Scanner re = new Scanner(System.in); // Import the scanner into the main method

 int temp; // Define the integer called temperature that the user will put in

 do { /* This is a do while loop -- it will go through the loop, and then it will check the value.

      I decided to use this because we can define temperature without checking the value first.

     What this loop is doing is taking in the temperature, and then checking if it's right. If

     it's a high enough temperature, it will tell the user that it's ready, but if not, it won't. */

     temp = re.nextInt(); // Allow the user to enter in the temperature

     if(temp >= 270) { // if it's high enough, say that it's ready

         System.out.println("Your taffy is ready for the next step!");

         

     }

     else { // if not, don't

          System.out.println("The mixture isn't ready yet.");

         

     }

 }

 while(temp < 270); // This makes sure that if it's ready for the next step, we don't have to continue

}

}

5 0
3 years ago
Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
Llana [10]

Answer:

D - a doctorate degree

Explanation:

You are studying in a role as a doctors position.

8 0
1 year ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
3 years ago
Other questions:
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    7·1 answer
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • A(n) ____ represents a particular type of object in the real world.
    7·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • It is possible to limit the search results to a range of publication dates.
    13·1 answer
  • Which command do you use to save a document with a new name? Choose the answer.
    10·2 answers
  • Did anyone do 5.7.5 Factorial on Code HS??<br><br><br><br> 20 POINTS
    9·1 answer
  • What is the fullform of ETA in computer term​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!