1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mafiozo [28]
3 years ago
11

A car has an odometer which at the start of a journey shows 99940 and at the end shows 00230.what is the result of subtracting 9

9940 from 00230
Computers and Technology
1 answer:
vampirchik [111]3 years ago
5 0

Answer:

99,710

Explanation:

Thats what my calculator said

You might be interested in
Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
il63 [147K]

Answer:

B

Explanation:

XML is mostly used for structural purposes

6 0
3 years ago
4.15 LAB: Password modifier
Black_prince [1.1K]

I've included my code in the picture below. Best of luck.

3 0
3 years ago
14 Convert the<br>following binary<br>numbers to decimal <br>0011​
xeze [42]

Answer:

.

Explanation:

4 0
3 years ago
Read 2 more answers
What model involves the creation of data and process models during the development of an application
matrenka [14]

Answer:

Data modeling

Explanation:

Data modeling is a term used in computer or software engineering. It is a technique of creating a data model for an information system through unusual formal methods. It also involves the analysis of models during the development of an application. It is further divided into three places including:

1. Conceptual data

2. Logical data model

3. Physics data model

Hence, Data modeling is a model that involves the creation of data and process models during the development of an application

6 0
3 years ago
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
Sindrei [870]

Answer:

A) hacktivist

Explanation:

According to my research on cyber security attacks, I can say that based on the information provided within the question the form on online vandalism being defined is called hacktivist operations. These are activists who hack into government or organizational systems in order to protest their policies or actions, and by doing so can severely damage their systems.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • https://brainly.com/app/ask?entry=top&amp;q=What+did+you+learn+during+this+course+that+reinforces+your+belief+in+your+technology
    5·1 answer
  • Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two
    11·1 answer
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • In relation to data science,advances in technology has made it more feasible to do what
    5·1 answer
  • Which two features offered by SharePoint
    12·1 answer
  • When would it be appropriate to run MS Office or Adobe on the Windows OS server ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!