1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
13

Write the steps to find the LCM of three numbers​

Computers and Technology
1 answer:
just olya [345]3 years ago
7 0

Answer:

First factor of three number ,then take common numbers between three factor ,then common ×remaining number ,hope you will find your answer

You might be interested in
When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d
dusya [7]

Answer:

True

Explanation:

Information hiding involves using private fields within classes and it's a feature found in all object-oriented languages such as Java, Python, C#, Ruby etc.

When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your data will be altered only by the properties and methods you choose and only in ways that you can control.

8 0
3 years ago
Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
coldgirl [10]

Answer:

RAID 1

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. RAID 1 requires a minimum of two physical drives, as data is written simultaneously to two places. The drives are essentially mirror images of each other, so if one drive fails, the other one can take over and provide access to the data that's stored on that drive.

3 0
3 years ago
Describe five different ways databases can be processed
Tresset [83]
The five different ways databases can be processed are :
1) Queries, Forms and Reports
2) Application Programs
3) Stored Procedures
4) Triggers
5) Web Applications
6 0
3 years ago
Why was the personal computer an important invention?
antoniya [11.8K]
This was an important invention in helping people connect and do many tasks while at home.
8 0
3 years ago
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
Other questions:
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • What do you have to do to see the html code on a website?
    15·2 answers
  • Consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as follows:
    15·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • What is the best way to show a complex data chart in word?
    6·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • to see which employees received 3 or more bonuses. use the highlight cells rules conditional formatting to format cells in the r
    6·1 answer
  • 1. A bank customer invested $24 in a bank with 5 percent simple interest per year, write a program the construct a table showing
    11·1 answer
  • What is output?<br> x = 2<br> y = 3<br> print (x * y + 2)<br> 4<br> 2<br> 8<br> 10
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!