1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
15

3n - 12 = 5n - 2 how many solutions?

Computers and Technology
1 answer:
Luda [366]3 years ago
6 0
N=-5 sry about the other guy stealing
You might be interested in
3) Write the example of LAN.​
Aleks [24]

Networking at home, Networking in an office, networking between two computers.

6 0
2 years ago
Read 2 more answers
Hardware is defined as the physical parts of a computer
ddd [48]
Indeed, this is to be true as software is to programs and applications(apps) hardware is to physical computers such as hard drive, SSD, motherboard, ram, graphics card, ect...
8 0
3 years ago
1. All the computer has a power button.​
Lisa [10]

Answer:

The power button is a round or square button that powers an electronic device on and off. Nearly all electronic devices have power buttons or power switches. Typically, the device powers on when the button is pressed and powers off when it's pressed again.

Explanation:

7 0
3 years ago
Read 2 more answers
If ######## or 12.0E+3 what should you do so the cell will display the actual number?
xxTIMURxx [149]

Delete the cell is what i read on google, so i hope this helps and i apologize if it is wrong.

6 0
3 years ago
Hailey was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
goblinko [34]

Answer:

a compression software such as WinRar

Explanation:

The utility she used to do this would have been a compression software such as WinRar. This software compresses large files or various files into a single ZIP or RAR file. This compressed file is much smaller than the original files that it contains, which is accomplished through a compression algorithm. This can also be encrypted with a password so that only specific individuals with access can open the file. Once unzipped or extracted, the original files are obtained in its original size.

3 0
3 years ago
Other questions:
  • When a machine on the public network wants to reach the server at 172.30.0.10, which ip will it use?
    6·2 answers
  • Which type of factories began to flourish in the late eighteenth century
    5·1 answer
  • How is hyper tension, heart disease, and strokes related?
    13·1 answer
  • Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display tha
    10·1 answer
  • What is the difference between dial up and broadband connections?
    15·2 answers
  • Effective presentations must have _____.
    14·2 answers
  • Define power supply and types of power supply<br>​
    11·1 answer
  • Follow me please.........​
    14·1 answer
  • What is a phone made out of dna
    15·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!