1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
4 years ago
10

Arun is 5 years older than Anu. five years ago, the ratio of their ages was 3:2 . find their present age​

Computers and Technology
2 answers:
vagabundo [1.1K]4 years ago
3 0

Answer: Arun is 15 years old and Anu is 10 year old

Explanation:

Multiple 5 by 3, Multiple 5 by 2 there goes you answer please give 5 stars and Thanks

Harrizon [31]4 years ago
3 0
Arun is 15 years old and anu is 10 years old
You might be interested in
Firefox, you can open a link in a new tab by first ____ a hyperlink.
MrMuchimi
<span>middle-click the link (e.g., mouse scroll wheel)<span>Ctrl+click the link (Mac: Command+Click)</span></span>
8 0
4 years ago
Which of the following is not a scene mode?
tatiyna
I believe the answer is C) Model.
7 0
4 years ago
Read 2 more answers
Which of the following are disadvantages of networks? Check all of the boxes that apply.
RideAnS [48]

Answer:

• Network intruders can access all computers on a network.

• Networks are costly to set up.

Explanation:

A network can be defined as a connection between the internet and the computer. A network is a means by which information or data are transmitted from one computer to another.

We have various types of networks and some of them are:

a) Local Area Network (LAN)

b) Wireless Local Area Network (WLAN)

c) Wide Area Network (WAN)

d) Campus Area Network (CAN)

e) Metropolitan Area Network (MAN)

f) Personal Area Network (PAN) e.t.c

The disadvantages of network are:

a) Network intruders such as computer hackers can easily access all computers on a network.

b) Networks are costly to set up.

It is of outermost importance that a network used by a computer is secured using security such as encryption in other to prevent data loss , hackers and exposure of information that are sensitive to computer users.

4 0
3 years ago
The java class library interface queue method to put an entey on the back of a queue that returns false if the method falls is
Mars2501 [29]

Answer:

(A) Add.

Explanation:

The add method of queue inserts an element at the tail of the queue.

syntax:- queue.add(element);

It's return type is boolean it returns true if the insertion is successful and returns false if the insertion is unsuccessful and it returns an IllegalSpace Exception if there is no space left to insert an element in the queue.

5 0
4 years ago
A(n) ____ is the equivalent of a field in a file system.
andrew-mc [135]
<span>An attribute is the equivalent of a field in a file system. That is what they call a field because it is a component of a file. In information technology, and relating to data files in particular, file systems use attributes to define their files and make them more specific and easily identified within a data system as a whole.</span>
6 0
4 years ago
Other questions:
  • You want to arrange 6 of your favorite CD's along a shelf. How many different ways can you arrange the CD's assuming that the or
    15·1 answer
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • Which of these practices should you follow while creating your résumé?
    14·1 answer
  • How do I translate my Flowchart into Psuedocode?
    15·1 answer
  • Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which y
    11·1 answer
  • Write a method named showChar. The method should accept two arguments: a reference to a String object and an integer. The intege
    6·1 answer
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • I need help ASAP Asap asap!!!
    11·1 answer
  • One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business fun
    13·1 answer
  • Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!