1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
8

Hello 10 points if my Chromebook is on 26 percent how much time do I have left theoretically

Computers and Technology
2 answers:
velikii [3]3 years ago
7 0
About 15 minutes.......
zalisa [80]3 years ago
6 0

Answer:

maybe an hour or moreeee....

You might be interested in
Explain the process of creating a switch statement to replace an if-then-else statement in Java.
musickatia [10]

Answer:

The answer to this question is given in the explanation section.

Explanation:

Let look at an if the else statement

if (condition1) {

 //some code if condition 1 is true

} else if (condition2) {

 // some code if condition 2 is true

} else {

 // some code if condition 3 is true

}

No let look at switch statement

switch(expression) {

 case x:

   // code block

   break;

 case y:

   // code block

   break;

 default:

   // code block

Now let look at your answer.

if then else should be replaced with switch if conditions are fixed.

in the process of replacing

write your condition of if statement  in the case area of swatch

7 0
3 years ago
(8.03)
Hitman42 [59]

Answer is:  A

Because he would need to improve flawed areas.

7 0
3 years ago
Um its a weird question, but i want to ask anyways. Please dont report! I really need an answer!
den301095 [7]

okay here is what i got.

try restarting your wifi router and if that doesn't work then restart the console.

other than that i got nothing

hope this helps.

7 0
3 years ago
Read 2 more answers
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
What’s unique about windows 8 compared to earlier windows
skad [1K]
New Interface, features like start screen, faster boot time, dynamic desktop, improved search function, windows love syncing, windows to go, and improved security.
7 0
3 years ago
Other questions:
  • The point on the middle of an edge in SketchUp is called a...
    5·2 answers
  • The process of recognizing information? needs, using efficient search techniques to locate reliable sources of? information, and
    9·1 answer
  • You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
    11·1 answer
  • What is a good starting point for data mining?
    5·1 answer
  • By default, Outlook displays messages in the Content pane grouped by the
    13·1 answer
  • An organized file title helps save time locating files, communicates professionalism, and lets us know the file is most likely N
    10·1 answer
  • Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryB
    15·1 answer
  • Which of the following can be used to help find the error
    8·1 answer
  • A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust
    15·1 answer
  • HELPPPPP!!! Performance Check: Mini-Quiz
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!