1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tju [1.3M]
2 years ago
5

Free 100 point to first to answer

Computers and Technology
2 answers:
saveliy_v [14]2 years ago
5 0

Answer:

b

Explanation:

its a ratio my friend

patriot [66]2 years ago
4 0

Answer:

ur answer friend

Explanation:

the answer will be

[unit price]*[number sold]

You might be interested in
Pls answer 10 points ​
AlekseyPX

Answer:

1. C

5.b

Explanation:

1. Is c because it is in the short cut key

5. Is B because it is the last choice

3 0
2 years ago
Read 2 more answers
Which of the following type of software is the most powerful for managing complex sets of data?
devlian [24]
Well i thinck the ancer is b
5 0
3 years ago
Read 2 more answers
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ladessa [460]

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

8 0
3 years ago
A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one child cl
Troyanec [42]

Answer:

The answer is A)

Explanation:

In programming languages like java you can only use single inhertance meaning a class can only inherit attributes from one class. But in other languanges like C you can have multiple inhertance

6 0
2 years ago
What are keywords? hep please give a good awncer
Anika [276]

Answer:

Keywords are words or phrases that describe content. They can be used as metadata to describe images, text documents, database records, and Web pages. ... Keywords are used on the Web in two different ways: 1) as search terms for search engines, and 2) words that identify the content of the website.

4 0
2 years ago
Read 2 more answers
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • What udp port is used for i k e traffic from vpn client to server?
    14·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta
    14·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • HELP PLZZ FAST!!!!!
    10·2 answers
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    11·1 answer
  • an organization wants to use its computer to make video calls with suppliers overseasename two input and two output device that
    8·1 answer
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!