1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
8

The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an

d silk on every single device i try that ive never gotten before my parents put the box on our router. i used to get redirected to "meetbluecircle.com" but now it just does this error and im so annoyed and mad and just freaking confused out of my mind about how i get these errors to go away becuase its blocking any site i try to go to.EVEN THE FREAKING HELP FORUM FOR GOOGLE!!!!Please help me im going crazy trying to figure out how the heck i get this to go the frick away
Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

34

Explanation:

WHY BECAUSE 34 IS PRIME AND THIS PROBLEM REDUCE THE NUMBER AND CHANGE THE NUMBER INTO A MIXED NUMBER

You might be interested in
____ a device receiving a process variable
Tanya [424]

Answer:

Transmitter

Maybe this is the answer or the question is wrong.

Explanation:

In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.

6 0
3 years ago
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
Darnell is preparing to read A Rocket to the Stars for class. What might he predict based on the title?
liq [111]

Answer:

It is science fiction

Explanation:

Rockets and stars relate to science

8 0
3 years ago
Read 2 more answers
You interact with a program through which of the following, thereby controlling how you enter data and instructions and how info
kaheart [24]

Answer:C)User interface

Explanation: User interface(UI) is the interaction phase of the user or programmer with the computer system and network. This phase helps the user to connect with the operating system function and let them process it according to the requirement. Example-monitor , keyboard, mouse etc.

Other options that are given are incorrect because operating system is the system that is part of the interface , information is the data and storage is for the storing of data,.Thus the correct option is option(C)

4 0
4 years ago
Read 2 more answers
The current in a resistor is 5.0 A, and its power is 60 W. What is the voltage?
alexandr1967 [171]

The voltage on a resistor will be "12 V".

According to the given question,

Current,

  • I = 5.0 A

Power,

  • P = 60

As we know the formula,

→ Power (P)= Current(I)\times Voltage (V)

or,

→              V = \frac{P}{I}

By putting the giving values, we get

→                  = \frac{60}{5}

→                  = 12 \ V

Thus the solution above is right.

Learn more about voltage here:

brainly.com/question/18883096

8 0
3 years ago
Read 2 more answers
Other questions:
  • A model release can be either oral or written down. true or false
    11·2 answers
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • All of the following are reserved keywords in C++ EXCEPT
    5·1 answer
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou
    5·1 answer
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • They are correct? thank you!
    6·2 answers
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • Rita tried unsuccessfully to open a PDF file attachment in her Inbox by double-clicking the attachment in the Reading Pane. What
    8·1 answer
  • The TCP _____ is the amount of information that a machine can receive during a session and still be able to process the data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!