1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
7

Convert.46 to a percentage

Engineering
1 answer:
natima [27]3 years ago
6 0

Answer:

46%

Explanation:

Move the decimal two times and you should have a precentage.

You might be interested in
A tension test is carried out on an Al alloy specimen which has an original diameter of 0.505 in and an original gauge length of
Contact [7]

Answer:

Detailed solution is given in attached image

5 0
3 years ago
What should be your strongest tool be for gulding your ethical decisions making process
valkas [14]

Answer:

Recognize that there is a moral dilemma.

Determine the actor. ...

Gather the relevant facts. ...

Test for right versus wrong issues. ...

Test for right versus right paradigms. ...

Apply the resolution principles. ...

Investigate the trilemma options. ...

Make the decision.

7 0
2 years ago
While discussing VIN numbers, Technician A says that the first digit of the VIN identifies the country where the vehicle was man
ruslelena [56]
Usually the first digit of the vin id’s the country it was built. So technician A would be correct. That’s usually how it is. Hope this helps. Please let me know if this is incorrect
4 0
3 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
1. In a safe approach to electrical work,
slega [8]

Answer:

D. Measure the voltage on the conductor with a known good meter

Explanation:

4 0
2 years ago
Other questions:
  • When watching your weight, you want to snack smart. To do that, you want a snack that is going to __________.
    13·1 answer
  • Please help me with this question​
    8·1 answer
  • Your manager has asked you to research and recommend a writing guide that examiners in your digital forensics company can use fo
    8·1 answer
  • What is the major drawback to use whiskers as a dispersed agents in composites? a)- High price b)- Large length to diameter rati
    7·1 answer
  • A force of 16,000 will cause a 1 1 bar of magnesium to stretch from 10 to 10.036 . Calculate the modulus of elasticity in . (Ent
    6·1 answer
  • The electrical panel schedules are located on EWR Plan number ___.
    13·1 answer
  • A thin 20-cm*20-cm flat plate is pulled at 1m/s horizontally through a 4-mm thick oil layer sandwiched between two stationary pl
    15·1 answer
  • Explain with examples:<br> What are the reasons of a successful and unsuccessful software project?
    8·1 answer
  • Water from an upper tank is drained into a lower tank through a 5 cm diameter iron pipe with roughness 2 mm. The entrance to the
    11·1 answer
  • What do you mean by decentralization??​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!