1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
6

Please Help me no links.

Computers and Technology
1 answer:
VladimirAG [237]3 years ago
4 0

Answer:There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

You might be interested in
What is systems integration?
valina [46]

Explanation:

In engineering, system integration is process of bringing various component subsystems together into one single system and also ensuring that these subsystems function as one system together.

In information technology, it is process of linking together various computing systems and various software applications functionally or physically, to act as coordinated whole.

System integrator integrates various discrete systems utilizing variety of techniques.

7 0
4 years ago
Features of action files​
nadezda [96]

Answer and explanation:

An ".action" file is a file written in Xcode and used by the <u>Automator</u> program, whose function is to create automations in macOS.  Action files contains specific actions that can be combined with other actions to create an automated process.

This type of file is used to automate tasks in <u>macOS</u>, usually with Finder (file manager) or another program.  

Action files are especially useful for repetitive tasks, such as creating sequential batch folders, editing images, or deleting files.

6 0
3 years ago
A built in mathematical formulae used to perform calculation _______​
zubka84 [21]

Answer:

o enter an Excel formula into a cell, you start with an equal (=) sign. Excel then knows that the expression that follows should be interpreted as a calculation, not text. After the equal sign, you enter the formula. For example, you can find the sum of the numbers in cells C2 and C3 by using the formula =C2+C3.

Explanation:

hope that helps you

6 0
3 years ago
which of the following are advantages of a wide area network, as opposed to a local area network? select two options
AnnZ [28]

Answer:

Advantages of Wide Area Network as opposed to the Local Area Network:

Because of wide area network (WANs) connections are available from house to house, city to city, country to country. For ex: Internet.

WAN is connecting the devices with various wireless technologies such as: cell phone towers or satellites. All these are much harder to setup with LANs.

Local Area Network (LANs) connections can only operate in a local area, not bigger than a house or a floor in a office building and also you cannot buy a ethernet cable that can reach throughout entire building and Wi-Fi connection rapidly disconnected as you get further then few meters away.

3 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Other questions:
  • What at some advantages of creating a powerpoint?
    9·1 answer
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • All of the following are types of goals listed in the course except?
    14·2 answers
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    15·1 answer
  • How does inertia affect a person who is not wearing a seatbelt during a collision
    8·1 answer
  • Which Boolean operator enables you to exclude a search term?
    11·1 answer
  • A value chosen by the responder to identify a unique IKE SA is a _________.
    7·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
  • Write an if-else statement that determines whether the variable points is outside the range of 9 to 51. If points is outside the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!