1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dolphi86 [110]
3 years ago
14

En un grupo de estudiantes el 60% son mujeres.Si por todos son 45 ¿cuantos hombres y mujeres son?

Computers and Technology
1 answer:
enot [183]3 years ago
7 0
27 mujeres
18 hombres

Mira:
60% * 45 = 2,700
2,700/100= 27

Si el 60% son mujeres, entonces
45-27=18 hombres
You might be interested in
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
This list is in _____ order.
Illusion [34]
Descending.

Alphabetical order is from A-Z.
Ascending order is from A-Z.
Descending order is from Z-A.

Hope this helps!
5 0
3 years ago
Read 2 more answers
What data does Bittorrenting uses? Explain.
amid [387]

Answer:

A BitTorrent software consumer utilizes that data into the torrent data to communicate special tracker and support shifting of that data among networks including either complete or incomplete representations about the data-set.

Explanation:

BitTorrent is based at the thought of any torrent, which is a smallish data that includes metadata regarding a host, specific tracker, that organizes the data sharing and data that is distributed. A peer that wants to advance data available need first attain a tracker for the data, generate a torrent and later share the torrent data. Different peers can next use the information included in the torrent file support all other in downloading that data. That download is organized by that tracker.

5 0
3 years ago
You are troubleshooting a dns issue on a linux system, and need to test the resolution of your domain mycompany.com mx record us
Ipatiy [6.2K]

Answer:

nsLookup mycompany.com

Explanation:

Start a DOS command window. To do that, click Start, click Run, type cmd, and later press Enter.At the command prompt, copy the following command. Substitute example.com with the domain that you need to examine:

"nsLookup mycompany.com"

4 0
3 years ago
Read 2 more answers
Which code is an example of XHTML?
lidiya [134]
D, because it’s the only one in html format
8 0
3 years ago
Other questions:
  • What types of automation device might require specialist installer training?
    5·1 answer
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Which of the following is true of the Internet as a medium for branding? a) The Internet is more effective as a media for brandi
    10·1 answer
  • What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
    13·1 answer
  • The interprets the data while it is in RAM​
    8·1 answer
  • How to boost audio live ​
    10·1 answer
  • How to shutdown a computer by step by step​
    5·2 answers
  • 1 point
    5·2 answers
  • Why are iterators useful?
    8·1 answer
  • A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!