1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
12

Cari brought 2 pounds of grapes at the grocery store she ate 5 ounces of the grapes on way home what is the weight of the grapes

that made it all the way home
Computers and Technology
1 answer:
sveta [45]3 years ago
7 0

Answer:

27 ounces

Explanation:

You can convert 2 pounds into 32 ounces then subtract the 5 ounces that she ate from that 32.

You might be interested in
A _____ can be destructive and can modify or delete files that may not be recoverable.
umka21 [38]
Virus

Hope this helps
6 0
3 years ago
The ____________ command / function is used in Python graphics and text-based programming code.
sleet_krkn [62]

A. write()

2.4. Graphics

Graphics make programming more fun for many people. To fully introduce

graphics would involve many ideas that would be a distraction now. This section

4 0
2 years ago
What US agency originally started ARPANET?
RUDIKE [14]
<span>c. Department of Advanced Research Projects Agency</span>
8 0
3 years ago
What are the groups located within developer tab? check all that apply.
deff fn [24]

Answer:

controls, code, protect, and add-ins!

Explanation:

edge 2021

6 0
2 years ago
PLEASE HELP ASAP! 15 POINTS!!
yan [13]

Answer

Rafael can go to the What's New option under the Help tab.

3 0
3 years ago
Read 2 more answers
Other questions:
  • * Declare a variablecalled "car" of type "Car", and initialise its value to a new instance of the "Car"class.
    9·1 answer
  • Why would a brokered CD pay more than a regular CD?
    13·1 answer
  • 4. An advantage presented by straight-in spaces is that
    12·1 answer
  • Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again
    6·1 answer
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • E-banking is also called: [1]
    9·1 answer
  • What does this mean??
    11·2 answers
  • In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the execut
    5·1 answer
  • What statement describes the last step in evaluating<br> information?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!