1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
6

Fill in the blank computers are closed in......​

Computers and Technology
1 answer:
Illusion [34]3 years ago
3 0

computer are closed in when there is no electricity or battery

You might be interested in
How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either
True [87]

Answer:

Following are the solution to this question:

Explanation:

In the following forms, RXS can appear:  

R X S \_ \_ \_  \_ it may look like that really, 4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ R X S  \_ \_  \_ it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_  \_  R X S \_  \_ it may look like that really, 4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ \_ \_  R X S \_ it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ \_ \_ \_ R X S it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

And we'll have a total of 24 \times 5 = 120 permutations with both the string RXS.

In the following forms, UZ can appear:

U Z \_ \_ \_ \_\ _  They can organize your remaining 5 characters through 5 categories! Procedures = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ UZ \_ \_ \_ \_ They can organize your remaining 5 characters through 5 categories! Procedures = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ U Z \_ \_ \_They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_ U Z \_ \_They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_ \_ U Z  \_ They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_  \_ \_ U Z They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

There may be 120 \times 6 = 720 ways of complete permutations.

5 0
3 years ago
To apply the StartSafe philosophy to preventing workplace violence, what are the three steps to follow? A. Plan for your job req
Sonbull [250]
<span>C)Understand how to protect yourself, think about safety in your surroundings, and plan your possible responses to a violent situation.</span>
8 0
4 years ago
Read 2 more answers
____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
Sphinxa [80]
It is the internet callback technology that allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing. It is a technology that enable one to browse the Internet to cue on a certain website to have a representative call a certain number.<span />
6 0
3 years ago
Read 2 more answers
A ____ appearing in the main text of a document indicates a footnote or endnote.
baherus [9]
<span>An asterisk or a superscript number.</span>
6 0
3 years ago
Pleaseee help me with the typical situations of the icons(i already know for words but I have no idea for giving the situations
Aliun [14]
Send the icons so i can answer
4 0
2 years ago
Other questions:
  • How do you do these questions? The first two questions could have multiple answers and the third is one answer only.
    7·1 answer
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • 1. Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment
    5·1 answer
  • Which statements identify what astronomers currently know and think will happen with our universe? Check all that apply.
    15·2 answers
  • Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
    15·2 answers
  • Select the correct answer.
    13·2 answers
  • Mike gets along with his co-workers and is always helpful to the clients. He demonstrates good _____.
    7·2 answers
  • Explain the application software and utility software in detail​
    15·1 answer
  • During the POST process, the BIOS uses two (2) different ways to notify you of a problem, Error beep codes and error messages, e
    10·1 answer
  • missy just hired a software development team to create an educational simulation app for a high school course. she has specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!