1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
5

A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro

und your answer to the nearest tenth.
Computers and Technology
1 answer:
Lunna [17]3 years ago
5 0
37.26 megabytes have been downloaded
You might be interested in
I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
Elena L [17]

Answer:

true!

Explanation:

its better to know your password :))

3 0
3 years ago
A restaurant chain has several store locations in a city (with a name and zip code stored for each), and each is managed by one
bazaltina [42]

Answer:

The restaurant chain system consist of restaurant id, name, zipcode, manager id, menu list.

Manager; manager id, name, phone no, and store.

Menu; menu id, type, items and description.

Items; item id, price and description.

Explanation:

Please look at the attachment for the E. R diagram.

5 0
3 years ago
how do you make a 3d project im a huge programer and I need to know how to do it or all I do will be considered retro gaming
aivan3 [116]
Bacon, go to the bacon! WORSHIP THE BACON!!!!!!!
6 0
3 years ago
Symbols can enhance your text. You can add mathematical or currency symbols, geometric shapes, and even smiley faces. Under whic
Sliva [168]
The answer is D. Hope this helped.
4 0
3 years ago
True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
TEA [102]
Risk assessment should cover all the processes and systems included in an organization. This means this includes also the technical support including <span>firewalls, secure operating systems and networks, and antivirus protection. Risk is always present and inevitable in every way so it is important to anticipate and make early detections to counter with actions as soon as one can.</span>
5 0
3 years ago
Other questions:
  • 3.14 LAB: Simple statistics for Python
    7·1 answer
  • The type of meter used to test downstream digital signal quality
    12·1 answer
  • 2. From the listing code, please give the block of line numbers for code which are concerned with the following: A) Main functio
    5·1 answer
  • The development of various technologies led to many historic events. Use information from the Internet to describe one major his
    7·1 answer
  • What is the interface in Java programming Language? Why do we need to use it?
    6·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • Which components exist in the contextual tab for tables called Design? Check all that apply.
    15·2 answers
  • Find out the names of at least 20 programming languages and their developers.
    12·2 answers
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!