1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
5

Look at the data set below. {9, 12, 12, 15, 18, 20, 25} in this data set, what is the median

Computers and Technology
2 answers:
cluponka [151]3 years ago
8 0

. Answer: Median: 15

Flura [38]3 years ago
8 0
15 because 9,12, and 12 are a group of 3 and 18,20, and 25 are also a group of 3 so, the leftover number is 15.
You might be interested in
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
When keying, keep fingers curved and upright over the home keys.<br> False<br> True
Dmitry [639]

Answer:

This is true.

Explanation:

I think everyone was taught to to type correctly sometime in school or at home. It helps you proficiently type. But most people don't use the Home Room Key Technique. Most use the "Chicken peck"

3 0
3 years ago
Welcome to Cypres...
Debora [2.8K]

Answer:

<em>sorry</em><em> </em><em>I </em><em>don't</em><em> </em><em>know</em><em> </em><em> </em><em>I </em><em> </em><em>can't</em><em> </em><em>will</em><em> </em><em>your</em><em> </em><em>help</em>

5 0
4 years ago
Nnbnnb dfhhfhfbhfbhdffd<br> ddbhfbhdhfbhdhf<br> hhffudjbfbjkd<br> dbhdfbhbfhdb
saveliy_v [14]
Tahheuend
Thatgeheh
Thahyateg
Fascinating
:)
6 0
3 years ago
What type of computer lies between micro and mainframe computer?
avanturin [10]

Answer:

Mini computer lie between micro and mainframe Computer.

Hope it will help you :)

3 0
3 years ago
Other questions:
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • What are six external parts of a computer
    11·1 answer
  • NEED HELP FAST
    13·2 answers
  • A .jpg file is an example of which of the following file types
    15·2 answers
  • An indirect effect of an action, be it a cost or benefit, for a third party who did not agree to the action is known as a(n) ___
    8·1 answer
  • Hello. I have an app which doesn't let me get in. It says: "wrong app info". I'm in a samsung device. How can I solve that probl
    13·2 answers
  • I need a Python program that will read a data file, perform an analysis, and write the results to a separate file with a .txt ex
    15·2 answers
  • Using complete sentences post a detailed response to the following.
    11·1 answer
  • Which game title went on to become the highest selling unbundled cartridge game?
    11·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!