1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
6

im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that

Computers and Technology
1 answer:
yanalaym [24]3 years ago
4 0

Answer:

18% of 7 is 1.26

Explanation:

your question was somewhat unclear

You might be interested in
Why are people's visions of utopias and dystopias subjective?
Leno4ka [110]

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

3 0
2 years ago
From your fist impression, write down what first comes to mind as to what is good and bad about the way the device works.
nalin [4]

Answer:

xczczxczx

Explanation:

6 0
3 years ago
What are html documents also called?
11Alexandr11 [23.1K]
HyperText Markup Language
4 0
3 years ago
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
Stuff that's displayed on a web page (Has to be 7 characters) (third letter is N, and fifth letter is E) little urgent
melomori [17]

Answer:

content

Explanation:

3 0
3 years ago
Other questions:
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • Write a question that the database will understand. Which records are not equal to 5? < 5 > 5 > =5 < > 5
    15·1 answer
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • In Python, parentheses are used in calculations where the order of operations affects the outcome. (5 points)
    9·1 answer
  • Data ____ refers to the accuracy of the data in a database
    9·1 answer
  • Qr code is more developed than barcode​
    11·1 answer
  • Help pweaseee!! Lloyd has created a validation script for a data entry form. What property should he use to test for a selected
    10·1 answer
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two
    15·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called what?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!