1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

Agent Hunt is transferring classified files from the CIA mainframe into his flash drive. SSS represents the size of the files on

the drive (in megabytes) after ttt seconds. S=5t+45S=5t+45S, equals, 5, t, plus, 45. What was the file size on the drive before the transfer?
Computers and Technology
1 answer:
stiv31 [10]3 years ago
7 0

Answer:

The size on the drive before the transfer is 45 megabytes

Explanation:

Before transfer, t which is the time in seconds is 0. Therefore given the formula: S = 5t + 45,

substituting t into the formula gives;

S = 5(0) + 45

S = 0 + 45

S = 45

You might be interested in
A major problem with alcohol adverstising is that
Pavel [41]

Answer:

A chronic disease characterized by uncontrolled drinking and preoccupation with alcohol.

Alcoholism is the inability to control drinking due to both a physical and emotional dependence on alcohol.

Symptoms include a strong need or urge to use alcohol. Those with alcohol use disorder may have problems controlling their drinking, continue to use alcohol even when it causes problems, or have withdrawal symptoms when they rapidly decrease or stop drinking.

Treatment involves counseling, such as behavioral therapy, and medications that reduce the desire to drink. Some people need medical detoxification to stop drinking safely. Mutual support groups help people stop drinking, manage relapses and cope with necessary lifestyle changes.

Explanation:

8 0
3 years ago
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
3 years ago
Definition of laptop
zaharov [31]
A device that sucks bc mien broke
7 0
3 years ago
Read 2 more answers
Why are wiki's not secure​
Nookie1986 [14]
Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism
7 0
2 years ago
When is the redo log buffer written to the redo log file?
natka813 [3]

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

5 0
3 years ago
Other questions:
  • You are a disgruntled employee with a master’s degree in computer sciences who was recently laid off from a major technology com
    11·1 answer
  • Write a brief one parapragh summary describing the financial reality of the American family.
    10·1 answer
  • 7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
    6·1 answer
  • Grace whistles while tickling Camille with a feather. Eventually, Camille starts to squirm and giggle every time Grace whistles,
    10·1 answer
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • In your opinion is it more beneficial to have many folders or is it better to nest subfolders
    12·1 answer
  • Overview
    7·1 answer
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!