1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
4 years ago
6

Jeff types a sentence “She wore a dress yesterday.” He erroneously typed w instead of e for dress. What is the accuracy of the t

yped sentence?
A) 96.6%
B) 90%
C)1%
D) 75.4%
Computers and Technology
1 answer:
jok3333 [9.3K]4 years ago
5 0
A would be you’re awnser.
You might be interested in
Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
Alex777 [14]

A. Allowed but might overkill

6 0
3 years ago
Read 2 more answers
To instruct Oracle11 g to sort data in ascending order, enter ____ after the column name in the ORDER BY clause.
Paha777 [63]

Answer:

A. ASC

Explanation:

In Oracle11 g ORDER BY clause is used to sort data andit is also used in mysql ,ms access.Though we not to mention ASC to sort in increasing order because by default it sorts the data in ascending order if we do not mention ASC or DESC.To sort in descending order we have to mention DESC.

So the correct answer to this question is ASC.

7 0
3 years ago
Read 2 more answers
What are the steps to insert an image into an email message place the steps in the correct order
AnnyKZ [126]

Answer:

How to insert photo into email?

Insert a picture into the body of an email message

To insert a picture that displays in the body of an email message, use the following steps: Position your cursor where you want the image in your message. Select Insert > Pictures. Browse your computer or online file locations for the picture you want to insert. I think this is helpful

8 0
3 years ago
Read 2 more answers
________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
Rudiy27

Answer:

"Cloud computing" is the correct answer .

Explanation:

Cloud computing is defined as it provided the resources of the system like data storage etc on the demanding purpose. In cloud computing, it provided the resources without knowing the management. Social media is one of the examples of cloud computing.

  • Cloud computing is a model in the computer system that stores the bulk data provided the services to the user on demands.
  • Cloud computing acts as a shared pool of virtual resources on the internet.
6 0
3 years ago
Python
elixir [45]

print("welcome to the bill calculator")

minutes = float(input("number of minutes you used: "))

data = float(input("the amount of data you used in GB: "))

print("your basic plan costs $39.99 per month")

mcost = (minutes - 450) * .45

print("you will be charged " +  str(mcost) + " for the minutes you used")

print("the monthly data fee is $30.00")

dcost = (data - 3) * 10

print("you will be charged " + str(dcost) + " for the extra data you used")

total = mcost + dcost + 69.99

print("your total bill is " + str(total))

the 20 value your teacher gave may be incorrect, bc 4.2-3*10 = 12 not 20, making the total 109.89

4 0
3 years ago
Other questions:
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • To close a tab, click the ____ button in the web page thumbnail on the tab switcher.
    9·1 answer
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    10·1 answer
  • If an engine has four cylinders and a total of 16 valves, how many valves would each cylinder have? A. Two B. One C. Four D. Thr
    12·1 answer
  • Anyone got the edmentum computer programming post test answers?
    6·1 answer
  • Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
    9·1 answer
  • Which of the following is the best name for a history report about world war 1
    7·1 answer
  • What is the output of the following code<br> X = 06<br> y = 0<br> print (x ** y)
    12·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!