1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
9

What does the % find?

Computers and Technology
2 answers:
Vesnalui [34]3 years ago
8 0
The amount of a percentage
-BARSIC- [3]3 years ago
3 0
It finds a AMOUNT or percentage of a number.

You find this by multiplying or dividing.
You might be interested in
According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
Kitty [74]

Answer:

The correct answer is letter "A": commit with fallback.

Explanation:

American Professor Alfred A. Marcus (born 1950) in his book "<em>The Future of Technology Management and the Business</em>" (2015) describes that hedging may be a strategy to shield businesses from the rapidly evolving world they face as a result of the continuous implementation of technology in the market. According to Marcus, there are 5 hedge approaches that firms should implement:

  1. Gamble on the most probable:<em> work on the product with the highest success rate. </em>
  2. Take the robust route: <em>invest in as many products as possible. </em>
  3. Delay until further clarity emerges:<em> waiting for a proper moment to react in front of market changes. </em>
  4. <u>Commit with a fallback</u>:<em> adapt according to the market. </em>
  5. Try to shape the future:<em> innovate.</em>
7 0
4 years ago
What would provide structured content that would indicate what the code is describing ?
ZanzabumX [31]

Answer:

A.XML

Explanation:

hope this helps

3 0
4 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
yawa3891 [41]

Answer:

  • Create partitions on each hard disk drives.
  • Mount the partition created on each hard drive so they are accessible by the the operating system.
  • Format the partitions created with a filesystem recognized by Linux.

Explanation:

Having purchased the two new SCSI hard disk drives with the controller cards for each and installed them properly, before using them for data storage and retrieval he must first use the fdisk command to create one or more partitions on each of the hard disk drives then mount any partitions created on the two hard drives so that they are accessible by the operating system before then proceeding to format any partitions created with a valid filesystem recognized by Linux.

4 0
3 years ago
What is an entity supertype, and why is it used?
marissa [1.9K]

Answer:

Correct answer is option B (The reason for using supertypes is to minimize the number of nulls and to minimize the likelihood of redundant relationships)

Explanation:

Entity supertype

A  entity supertype is a generic entity type which is related with one or more subtypes.

Use of entity supertype:

The reason for using entity supertype is to reduce redundant relationships and it is also used to minimize the number of nulls.

5 0
3 years ago
Other questions:
  • Find every number from 1 to n (inclusive) that is a palindrome which starts with the digit 3. Do not user a helper function.
    10·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • What is computer hacking?
    11·2 answers
  • Explain word processing ​
    11·2 answers
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
  • Write a program that produces an expense report for a trip to Lagos, Nigeria. Use the Internet to research the cost to travel to
    13·1 answer
  • Find the distance between the points.<br><br><br>(5,-2),(-6,-2)
    12·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!