1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
15

which software application offers a variety of templates for creating reports, flyers and newsletters that you can access within

the software or online?
Computers and Technology
1 answer:
sp2606 [1]3 years ago
4 0
Presentation Softwares
You might be interested in
¿Cuál es la potencia de una lámpara de incandescencia que se conecta a la red de 220 V, sabiendo que tiene una resistencia de 50
Juliette [100K]

Answer:

  • <u>1,000W</u> (rounded to one significant figure)

Explanation:

I will answer in English.

The question is:

  • <em>What is the power of a filament lamp that connects to the 220 V network, knowing that it has a resistance of 50 ohms?</em>

<em />

<h2>Solution</h2>

<em />

<em>Power</em>, <em>voltage</em>, <em>resistance</em>, and current, are related by either of the following equations:

  • P = V × I
  • P = R × I²
  • P = V² / R

Where:

  • P is power in watts (W)
  • R is resistance in ohms (Ω)
  • V is voltage in volts (V), and
  • I is current in amperes (A)

Since you know the voltage (<em>220V</em>) and the resistance (<em>50Ω</em>), you can use the last equation:

  • P = V² / R
  • P = (220v)² / (50Ω)
  • P = 968 W

Since the magnitude 50Ω has one significant figure, your answer should be rounded to one significant figure. That is <u>1,000W.</u>

7 0
3 years ago
Forensic scientists generally photograph and sketch a computer and its components during their analysis? True or false
jenyasd209 [6]
This is considered true sir 
6 0
3 years ago
Read 2 more answers
Because its radio waves can pass through walls or desktops,
jeka57 [31]
Bluetooth i believe, not too sure however but its ur best bet
5 0
3 years ago
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms
strojnjashka [21]

The answer in the space provided is the Diffie-Hellman Key Exchange. This is entitled to be the first published key algorithm in which has a limit in which the exchange occurs in secret values and that its purpose was to enable two users to have an exchange of key in a secure manner in means of using it for a subsequent symmetric encryption in terms of messages.

7 0
3 years ago
In which category would Jamal most likely find an
Phantasy [73]

Answer C.Education

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • How many ways can you add an image into google slides?
    8·1 answer
  • str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
    14·1 answer
  • Assume you are given three variables, revenue, expenses, and profit, all of type Money (a structured type with two int fields, d
    10·1 answer
  • TWO QUICK QUESTIONS
    12·1 answer
  • a 0.600 kg dynamics trolley has 1.5 kg load added. It is launched with a force of 10.n what is the acceleration
    15·1 answer
  • How do I type over Images (photo posted ​
    12·2 answers
  • Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?
    13·1 answer
  • A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
    12·2 answers
  • You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue.
    14·1 answer
  • You would like to help guide your company in choosing between valuing privacy and increasing the company's bottom line. What is
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!