1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
15

Simplify 0.2×0.03055 to 3 decimal places​

Computers and Technology
2 answers:
lions [1.4K]3 years ago
8 0
I think the answers is 0.061
jasenka [17]3 years ago
7 0

Answer:

this 0.061 or this 0.0611

Explanation:

You might be interested in
Why has the PCM sampling time beenset at 125 microseconds?
suter [353]

Answer Explanation:c

PCM( pulse code modulation) is a process for transmitting the analog data from one place to other place the signal which are used in pulse code modulation are binary that is only 0 and 1 using PCM all forms of analog data can be form including voice music etc.

to obtain pcm an analog signal is sampled at regular time interval the sampling rate is very high as compared to the frequency used by analog signal. the instant amplitude of analog signal at each sampling is being closer to the nearest several specific earlier levels.this process is called tantalization. in this the number of level is power of 2 so the sampling time is set as 125 microseconds.

3 0
4 years ago
When is historical data not useful
ValentinkaMS [17]

Answer:

to address for setting cost increase of a resource to determine the amount of money needed for a future project to plan for future years operation costs to predict sales based on past growth

7 0
3 years ago
Help debugging line 7 type error more arguments (5) than expected (1)
kolezko [41]

Answer:

import random

score = 0

for i in range(5):

   num1 = random.randint(1, 100)

   num2 = random.randint(1, 100)

   prompt = "What is " + str(num1) + "+" + str(num2) + "?"

   answer = int(input(prompt))

   result = (num1, num2)

   if answer == result:

       print("Well done!")

       score += 1

   else:

       print("incorrect")

print("Your score was", score)

Explanation:

Your error is on <em>line 7</em>, where you are providing multiple arguments to the input function, instead of 1.

One way to solve this is to create a variable prompt and concatenate all strings and variables within that variable to use for the input.

3 0
1 year ago
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • What operating system uses Fastboot?
    10·2 answers
  • Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
    13·1 answer
  • When Nathanil Inc, a network service provider, introduced 4G data plans, it observed that most of its customers completely stopp
    9·1 answer
  • When is it most appropriate to quote from an e-mail message in a response?
    9·2 answers
  • Design a Ship class with the following members:
    13·1 answer
  • A (an) block can arise from set ways of thinking.
    15·1 answer
  • When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variab
    12·1 answer
  • Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
    12·1 answer
  • The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
    10·1 answer
  • The Home editions of Windows 7 do not include the Local Security Policy or Print Management.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!