1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
2 years ago
9

Which would be the most appropriate way to estimate -6.1(0.22)? Check all that apply.

Computers and Technology
2 answers:
Sergeu [11.5K]2 years ago
7 0

Answer:

A.Use rounding to get -6(0.2), and then multiply. and D. use front end estimation to get -6(0.2), and multiply. and B.

Explanation:

just took the test

storchak [24]2 years ago
6 0

Answer:

A and D would be the answer(s) hope this helped!

Explanation:

You might be interested in
Which of these port transmits digital video
DaniilM [7]

Answer:

uhm

Explanation:

theres nothing there

7 0
2 years ago
Read 2 more answers
 What should every Software Engineer know about Software Architecture? ”<br> ??
Llana [10]
<span>Answer: -Software architecture isn't about big design up front; -Every software team needs to consider software architecture; -The software architecture role is about coding, coaching and collaboration; -You don't need to use UML; -A good software architecture enables agility.</span>
7 0
2 years ago
________ is the process of inspecting data that has been input to a program to make sure it is valid before using it in a comput
Mumz [18]

Answer:

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation.

Explanation:

The input should be validated before further processing to avoid problems in execution of program afterwards.

The process of input validation is defined to make sure that the input is valid.

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation ..

3 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
What might happen if you haven't decided on a course of action when you're within 4-6 seconds of the intersection?
Delicious77 [7]
You Could Cause An Accident To Happen.
7 0
3 years ago
Other questions:
  • What appears in the document after you have inserted a video?
    14·2 answers
  • Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
    14·1 answer
  • A posting error is:
    8·1 answer
  • MULTIPLE CHOICE QUESTION PLEASE HELP!!!!!!!!!
    14·2 answers
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • If you have defined a class named SavingsAccount with a public static data member named numberOfAccounts, and created a SavingsA
    7·1 answer
  • Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
    9·2 answers
  • You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
    14·1 answer
  • Stay safe and search answers up if you need ​
    14·1 answer
  • How do we find the time complexity for this algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!