1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
13

Complete the steps to evaluate the following

Computers and Technology
2 answers:
kirill115 [55]3 years ago
3 0

Answer:

log base 3a= -0.631.log a/3 base 3

Now, -log m= log 1/m

hence,

log base 3a= 0.631.log 3/a base 3

log base 3a/log 3/a base 3 =0.631

log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)

log base 3 3=0.631

Hence, answer is log base 3 3=0.631

Explanation:

Please check the answer section.

ASHA 777 [7]3 years ago
3 0

Answer:

Log 3 3 =1

Log 3 a/3 = -1.631

You might be interested in
The part of the computer that contains the brain
gulaghasi [49]

Answer:

It would either be the motherboard or the CPU.

Explanation:

"The part of the computer that contains the brain" is an odd way to put it. It would either be the motherboard or the CPU. The motherboard helps all the components work as one essentially preforming as one may call it a "brain". However, it can also be said that a CPU is alike in how a brain functions by processing information to other parts of the computer.

6 0
3 years ago
The Cars dataset has three columns giving the quality, machining angle, and machining speed of 18 cars.
yKpoI14uk [10]

Answer:

the answer is going to be dtype

3 0
3 years ago
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that
castortr0y [4]

Answer:

Moderate.

Explanation:

A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.

A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.

<em>However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc. </em>

8 0
3 years ago
Which are ways to move data, either by moving completely or copying into a new location? Check all that apply.
Tems11 [23]
Select data, press Control + C on the keyboard, select a target location, and press Control + V


It just like copy and paste
3 0
3 years ago
Read 2 more answers
In older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of
Irina18 [472]

Answer:

A metal faceplate with grounding means

Explanation:

metal faceplate with grounding means is required in older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of a conductive floor such as tile or cement.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is Not included in the Web Accessibility Initiative? Don’t rely on color alone.
    7·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • Computers and technology<br> Help 10 Points!!!!
    10·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • Which of the following describes the term "false information?"
    5·1 answer
  • Develop a simple game that teaches kindergartners how to add single-digit numbers. Your function game() will take an integer n a
    11·1 answer
  • Where should you look in order to find words as they are used in a variety of contexts?
    7·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
  • Help me<br>please answers this questions<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!