1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
8

The Last Free brainliest This Is The Last Brainliest That Im Doing Forever Sorry Guys

Computers and Technology
2 answers:
sweet [91]3 years ago
7 0

Answer:

Thank you so much

Explanation:

take care

Blababa [14]3 years ago
4 0

Answer:

brainliest

Explanation:

You might be interested in
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
Which of the following are characteristics of a cell
olganol [36]

Answer:

-occurs at the intersection of columns and  rows

-is a single unit for entering data on a  spreadsheet

-is located according to its cell reference or  cell address

Explanation:

A cell is a box in a spreadsheet program that contains information and each cell is identified using a cell reference that indicates the colum letter followed by the row number where the cell is located. So, according to this, the characteristics of a cell in a spreadsheet software are:

-occurs at the intersection of columns and  rows

-is a single unit for entering data on a  spreadsheet

-is located according to its cell reference or  cell address

5 0
3 years ago
Two machines can finish a job in StartFraction 20 Over 9 EndFraction hours. Working​ alone, one machine would take one hour long
Alborosie

<em><u>Answer</u></em>

5 hours

<em><u>Explanation</u></em>

The two working together can finish a job in

\frac{20}{9}  \: hours

Also, working alone, one machine would take one hour longer than the other to complete the same job.

Let the slower machine working alone take x hours. Then the faster machine takes x-1 hours to complete the same task working alone.

Their combined rate in terms of x is

\frac{1}{x}    +  \frac{1}{x - 1}

This should be equal to 20/9 hours.

\frac{1}{x}  +  \frac{1}{x - 1}  =  \frac{9}{20}

Multiply through by;

20x(x - 1) \times \frac{1}{x}  +20x(x - 1) \times   \frac{1}{x - 1}  =  20x(x - 1) \times \frac{9}{0}

20(x - 1)  +20x = 9x(x - 1)

20x - 20+20x = 9{x}^{2}  - 9x

9{x}^{2}  - 9x - 20x - 20x + 20= 0

9{x}^{2}  - 49x  + 20= 0

Factor to get:

(9x - 4)(x - 5) = 0

x =  \frac{4}{9}  \: or \: x = 5

It is not feasible for the slower machine to complete the work alone in 4/9 hours if the two will finish in 20/9 hours.

Therefore the slower finish in 5 hours.

8 0
3 years ago
A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
frozen [14]

Answer:

A application

Explanation:

3 0
2 years ago
Read 2 more answers
PLEASE HELP
kramer
Style  would be the great and best answer but you could add office decor
7 0
3 years ago
Read 2 more answers
Other questions:
  • A factory has a dedicated room just for computers. They are generally kept locked in the room and are never directly used by use
    5·2 answers
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • The process of adding a header to the data inherited from the layer above is called what option below
    8·1 answer
  • What are 3 ways to select an entire document?
    15·1 answer
  • _____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
    9·2 answers
  • These 2 questions PLEASEEE (:
    14·1 answer
  • ....................................................................................................
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!