1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
5

Any please answer this How much resistance is required to gen-erate 50 mA of current from a 5 volt bat-tery?

Computers and Technology
1 answer:
nasty-shy [4]3 years ago
7 0

Answer:

Calculating Currents: Current in a Truck Battery and a Handheld Calculator ... (b) How long does it take 1.00 C of charge to flow through a handheld calculator if a 0.300-mA current is ...

You might be interested in
In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.
jonny [76]

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

6 0
3 years ago
What is the purpose of OPPA? A. It regulates the strength of passwords chosen by the users. B. It prohibits the use of informati
Anna35 [415]

The purpose of OPPA is to make its mandatory for companies to disclose what kind of information they will acquire from their users.

D. It makes it mandatory for companies to disclose what kind of information they will acquire from their users.

<u>Explanation:</u>

OPPA is a Online Privacy Protection Act. It gathers data from individuals who use or visit your site and use it to execute business with them. A few organizations use client data for their very own inner showcasing purposes, for example, to figure out what sort of items or administrations to offer whenever the client utilizes the site or to create focused on arrangements of clients who have similar likes or aversions.

It makes it obligatory for organizations to reveal what sort of data they will secure from their clients. It likewise incorporates data, for example, name, road address, email address, phone number, date of birth, Social Security number, or different insights concerning an individual that could enable a customer to be reached physically or on the web.

6 0
4 years ago
A grid that organizes data is a
sukhopar [10]
Spreadsheet i believe
8 0
3 years ago
Read 2 more answers
What is the computer box called?
BaLLatris [955]
It is called the desktop or case.
7 0
3 years ago
Read 2 more answers
This is an example of what type of formula?
slamgirl [31]

Answer:

Average

Explanation:

The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.

3 0
2 years ago
Other questions:
  • Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of
    8·1 answer
  • Why are resources limited? Why can't we get everything all the time?
    12·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • 3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)
    9·1 answer
  • In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
    14·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • Suppose you have a class called Child with an instance data value called weight and height. Then it has a method called doubleWe
    5·1 answer
  • Which of the following are downlink transport channels?
    12·1 answer
  • A natural language processor comes across a sentence that contains the word “weightless.” The morphology component identifies th
    10·2 answers
  • does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!