1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
10

Any help , and thank you all

Computers and Technology
1 answer:
Paladinen [302]3 years ago
3 0

Answer:

There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:

You might be interested in
The smallest signed integer number, base 16, that can be store in a variable of type BYTE is__________.
sveta [45]

Answer:

The correct answer is ushort

8 0
4 years ago
A folder has been shared with other users and set to read-only. what does this mean for users?
fomenos
It means they cannot make changes inside those folders and they don't have permission to execute files within it.
5 0
4 years ago
Read 2 more answers
Which of the following is an example of plagiarism? A. Listing someone as an author who did not actually contribute to the publi
Nata [24]

Answer:

C. <em>Presenting someone else’s ideas or words and claiming them as one's own.</em>

Explanation:

The correct option is <em>C. Presenting someone else’s ideas or words and claiming them as one's own. </em>

The definition of <em>Plagiarism </em>indicates that stealing and passing off ideas or words created and / or developed by others and pretending or signifying that such words or ideas are one´s one is considering an act of plagiarism.

3 0
3 years ago
Explain the process of creating a linocut. How is it effective? Why is it criticized?
tankabanditka [31]
So making a linocut basically your taking your design and using the negative space to paint the same picture over and over its is a very easy and effective method how every its main drawback is unless you make a bunch of different ones you stuck with one design 
3 0
3 years ago
Read 2 more answers
Taran is concerned with the security of his macros in a database. Which security option could he use to provide protection?
Lynna [10]

Answer:security VBA code

Explanation:

6 0
3 years ago
Other questions:
  • To remove any hidden days from your document before sharing it, what should you do?
    7·1 answer
  • Which of these can be considered data?<br> A:facts<br> B:information<br> C:belief<br> D:all of these
    9·1 answer
  • Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (C
    14·1 answer
  • Construct a regular expression that recognizes the following language of strings over the alphabet {0 1}:
    10·1 answer
  • What is the term for water wave that is created by an underwater earthquake
    5·1 answer
  • The number of colors in a bitmap image determines which category the image will be in. Complete the following sentences.
    15·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • Most jobs in computer disciplines require which minimum level of education?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!