1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
11

A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif

e of about 6 hours in humans. Given caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours. Ex: If the input is 100, the output is: After 6 hours: 50.0 mg After 12 hours: 25.0 mg After 18 hours: 12.5 mg
Computers and Technology
1 answer:
Mariana [72]3 years ago
6 0

Answer:

you need help

Explanation:

You might be interested in
What are the advantages of Napier bones?​
Alja [10]

Answer:

portability and simplicaity are the featues of napier bones

8 0
3 years ago
there are these numbers that I've seen before but I don't know what they mean can someone help. I will give brainiest
Ne4ueva [31]

Answer:

Those numberss are binary code

Explanation:

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.

5 0
3 years ago
Read 2 more answers
A particular BI analysis might require data from an ERP system, an e-commerce system, and a social networking application, but s
maxonik [38]

Answer:

Data not integrated.

Explanation:

The Integration of data is the method of integrating data from various outlets into one consistent, coherent view.Integration starts  with the process of intake, which involves steps such as washing, ETL simulation and integration.

The data which is not represent  primary key/foreign key  relationship such a data is known data not integrated In this given question the BI is analysed the data from the ERP system and other from e-commerce system as well as from networking application the data is not described in primary key/foreign key relationships this kind of data is known as data not integrated .

8 0
4 years ago
Is it possible for the front and rear references in a circular array implementation to be equal?
azamat

Answer:

Yes it is possible for the following cases:-

  1. When the queue is full.
  2. When the queue is empty.

Explanation:

When the queue is full the the front and the rear references in the circular array implementation are equal because after inserting an element in the queue we increase the rear pointer.So when inserting the last element the rear pointer will be increased and it will become equal to front pointer.

When the queue is empty the front and rear pointer are equal.We remove an element from queue by deleting the element at front pointer decreasing the front pointer when there is only one element and we are deleting that element front and rear pointer will become equal after deleting that element.

7 0
3 years ago
Why is it essential for every person living in the 21st century to have a computer​
Zolol [24]

Answer: because computers are our main source of communicating and where we find a wide range of information to help us

Explanation:

4 0
3 years ago
Other questions:
  • most dialog boxes in windows programs requiring navigation follow a similar procedure. true or false.
    7·1 answer
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • The picture that graphically represents the items you use in windows is called a/an
    15·2 answers
  • _______is the equal distribution of visual weight on either side of an imaginary axis through the center of a design. A building
    6·2 answers
  • Which category of software would programming languages fall into?
    8·2 answers
  • The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the U
    10·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • Which of the following can technology NOT do?
    12·1 answer
  • Who is the traitor of UA?<br><br>1 Karishma<br><br>2 Yuga Aoyama<br><br>3 Denki <br><br>4 Mineta
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!