1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
7

16.

Computers and Technology
1 answer:
dimaraw [331]3 years ago
3 0
  • Answer:

<em>r = 15 cm</em>

  • Explanation:

<em>formula</em>

<em>V = πr²×h/3</em>

<em>replace</em>

<em>4950 = 22/7×r²×21/3</em>

<em>4950 = 22/7×r²×7</em>

<em>4950 = 22×r²</em>

<em>r² = 4950/22</em>

<em>r² = 225</em>

<em>r = √225</em>

<em>r = √15²</em>

<em>r = 15 cm</em>

You might be interested in
Electronic type is often considered to be the latest step in the evolution of the written ______________.
Allisa [31]
It isn’t people but im really confused. I think its A but dont come at me if its wrong
4 0
3 years ago
Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this threa
inn [45]

Answer:

"Deadlock" is the right solution.

Explanation:

  • A deadlock seems to be a circumstance where certain (two) computer algorithms that share a similar resource essentially prohibit each other during manipulating the asset, leading to both programs withdrawing to operate.
  • This occurs when multiple transfers or transactions block everyone by maintaining locks onto assets that every other activity also needs.

So that the above is the correct answer.

5 0
3 years ago
These are the records and traces an individual leaves behind as they use the internet
Roman55 [17]

Answer:

Option D. Digital footprints

Explanation:

<u>Digital footprint is all the stuff you leave behind as you use the Internet.</u>

4 0
3 years ago
Read 2 more answers
The two roots of a quadratic equation ax^2 + bx + c = 0 can be obtained using the following formula:
Feliz [49]

Answer: ion k

Explanation:

4 0
3 years ago
Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode
svlad2 [7]

Answer:

here

Explanation:

6 0
3 years ago
Other questions:
  • A number used to encrypt data is called a(n ________. signature key cookie escrow
    10·1 answer
  • Can using interior light help improve a drivers visibility at night
    9·1 answer
  • How does a main program recieve info from a function in c++?
    6·1 answer
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • How to bold words in microsoft word
    10·1 answer
  • D) Software which is basically language translation software.​
    11·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Weaknesses about ICT Technician
    9·1 answer
  • What is a use case of factorization in quantum computing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!