1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
5

I need help can yall help me

Computers and Technology
2 answers:
AnnZ [28]3 years ago
7 0
8.75
I think this is the answer. The way you solve this is you divide 175 by 20 and then you have the answer.

fiasKO [112]3 years ago
7 0
8.75 is your answer cx
You might be interested in
Why does a WEB photo have a smaller/lower resolution than a PRINT photo?
IgorC [24]

Answer:

So that the WEB photo will load faster on a website while a PRINT photo needs to look sharper and higher quality in a printed photo or book. ​

Explanation:

lower resolution = lower quality, load faster

7 0
3 years ago
What type of file system is used by blu-ray discs?
soldi70 [24.7K]

Answer:

Universal disc format (UDF) file system.

Explanation:

Blue-ray discs are the optical disc for data storage in a digital format. They were designed as succession of DVDs. They use UDF file system in them.

  • UDF file system is used in blu-ray discs.
  • This system is used to store data on discs by burning media.
  • These files have the extension (.UDF)
  • UDF is mostly used in DVDs and optical discs.
  • Broad range of data is stored in computer storage using UDF.
8 0
3 years ago
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses norma
LekaFEV [45]

Answer:

a trap door.

Explanation:

A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.

7 0
4 years ago
Which of these jobs would be most appropriate for someone who majors in information technology? A)developing new computing techn
mote1985 [20]

Answer:

B) managing a database for a large department store

C)managing the computer network for a large department store

Explanation:

An individual who majors in Information Technology is considered to be a professional with varying knowledge in the area of computers, networking, databases, and security. Such an individual is considered to be an expert in the area of database management, integration of software, and computer network optimization.

Hence, the most appropriate jobs for someone who majors in information technology is both options B and C

8 0
4 years ago
Read 2 more answers
Drag each tile to the correct box.
saw5 [17]

ISDN – improvement over dial-up; DSL – uses a higher frequency than a voice call; dial-up – makes your phone-line busy; cable internet – uses coaxial television cables; mobile internet – uses the cellular network are the different types of internet connection.

<h3>What is an internet connection?</h3>

The technology and systems of connectivity that allow a user to get access to the internet is known as an internet connection. There are different types of internet connection based on their technologies.

Hence, the different types of internet connection with their functionalities are mentioned above.

Learn more about internet connection here:

brainly.com/question/9380870

#SPJ1

7 0
2 years ago
Other questions:
  • Explain how abstraction is used in a GPS system
    12·2 answers
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • When inserting a fly in animation what is the first step in the process?
    9·1 answer
  • 4. A computer architect boasted that they were able to design a computer in which every instruction occupied exactly thirty-two
    8·1 answer
  • The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
    12·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • Convert ⅖ pie radian to degree​
    15·1 answer
  • Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his c
    6·1 answer
  • Question
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!