1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
6

A formula is a calculation. A. TRUE B. FALSE

Computers and Technology
2 answers:
Rina8888 [55]3 years ago
6 0
It is true because a formula is used in science math archeology and more
rusak2 [61]3 years ago
4 0
<span>A. TRUE is a formula calculation

</span>
You might be interested in
I need help with this!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them store dat
Bogdan [553]

Answer:

Yes, these things can be considered a computer. And they can also store and process data.

Explanation:

Headphones, radios, dishwashers, and remote controls are all computers because they all have some sort of logic board inside the device to control what it does. Example, a dishwasher has internal components that it uses to keep track of how long the wash/rinse cycle have lasted and how long they are supposed to last.

I hope that helps!

7 0
3 years ago
Write a story, a tale, a biography or a diary.
antoniya [11.8K]
I will write a very short story, so I hope this helps a little

The processing of gold: A diary entry

April 5/2018

I am the worlds most precious metal. 
I am worth more than any silly diamond, and far more stronger than Iron. No one can come close to being as important as I.

I start as a tiny mineral, found underground where I spend my days perfecting myself. Most might find relatives of mine in water, buried among sand and dirt. Then we are put through the most rigorous of training until we are god.

Well, gold, but you know what I mean.

Once I am perfection, I will be sold among the masses of people.   I will be loved my all and crafted into everything. If I wanted, I could take over the world...a world of just gold, wouldn't that be magical?

Today I think I will be made into a ring, I hope I am not squeezed on some fat woman's finger.

I hope this helps a little, Cheers :)

6 0
3 years ago
What would you need to have on your foley stage
LUCKY_DIMON [66]
<span>You will need many props for your Specific tracks (whatever you see in the film!). It's impossible to say what you will need until you see the picture and as time goes by you will add to your collection (if you have space!) - garbage day in my neighborhood is 'golden day' as I collect some of best props from the stuff people throw out: old bicycles, doors, sinks, wood, metal, desks, etc.</span>
4 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
Assoli18 [71]

Information should be cross-checked to ensure more than one source provides the same factual information.

<h3>What is the source of information?</h3>

The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.

The options given in the problem regarding the information as,

  • a. repeated
  • b. cross-examined
  • c. cross-lined
  • d. cross-checked

There are many feck news and nonfactual data is present over the internet and other source of information.

To get the factual information, one should always cross-checked the information from other sources.

Thus, the information should be cross-checked to ensure more than one source provides the same factual information.

Learn more about the source of information here;

brainly.com/question/26169752

7 0
2 years ago
Other questions:
  • What is the name for the individual sections of the ribbon in PowerPoint 20162
    8·1 answer
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • Mohammed's parents learn that his classmates have
    7·2 answers
  • What is the correct order of precedence of the mathematical operators?
    12·1 answer
  • Write python code that does the following: Ask the user to enter as many as number they want; Then find the sum and the average
    10·1 answer
  • Viruses and Malware Complete the case project on page 82 of the textbook by researching two types of viruses, two types of malwa
    13·1 answer
  • Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a senten
    7·2 answers
  • Explain the differences between copyright, fair use, and trademark?
    13·1 answer
  • 45 points!
    10·2 answers
  • All HTML5 webpages must begin with the HTML element _____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!