1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
6

Brainly, ""helping you get better grades"

Computers and Technology
2 answers:
Sunny_sXe [5.5K]3 years ago
7 0
Yikes- well I mean these are real people answering so they could make mistakes too
leonid [27]3 years ago
5 0

Answer: What do you except? All of this is user generated..

Explanation:

You might be interested in
If non-series-rated overcurrent devices (standard molded-case circuit breakers) are to be installed in the main switchboard, bre
const2013 [10]

Breakers with adequate short-circuit must be installed in the panelboards.

<h3>What are these equipment about?</h3>

Common Overcurrent Protection Devices (OCPDs) are known to be Breakers or fuses that are often used  to protect the full unit from too much current.

Note that Equipment such as switchboards and panelboards are often installed in an electrical system and they have to be of adequate measure of short-circuit current condition.

Learn more about overcurrent devices  from

brainly.com/question/14284905

3 0
2 years ago
How can you make a search phrase more effective?
Whitepunk [10]

Let's solve this together.

To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.

The answer is Option B. I hope this answer helped you!

4 0
3 years ago
What does a proxy server do?
Otrada [13]

I believe your answer would be C, but that also falls under a VPN.


8 0
3 years ago
Read 2 more answers
Write an algorithm that describes the second part of the process of making change (counting out the coins and bills).
Alenkasestr [34]

An Algorithm that describes the second part of the process can be written as listed below :

<h3>Algorithm describing the second part of the process of making change (counting out the coins and bills ) </h3>

<u>First step</u> : Initialize the required variables to zero to determine the number of coins and bills.

<u>Second step</u> : Prompt and read the amount to convert. amount to Hundreds

<u>Third step</u> : Compute hundred bill note as 100 amount equal to  ( amount% * 100 fifties - amount )

<u>Fourth step </u>: Compute fifty bill notes as :  ( amount% * 50 fifty bill notes )

<u>Fifth Step</u> : Compute Twenty bill notes as amount equal to ( amount% *20 Twenties - amount )

<u>Sixth Step</u> : Compute Tens bill notes as : ( amount% * 10 Tens bill notes )

<em>Note : continue the process for fives, Quarters, Dimes, Nickels, and Pennies. </em>

<em />

Learn more about Algorithm : brainly.com/question/13800096

#SPJ1

<u>Attached below is the missing part of the question </u>

<em>Write an algorithm that describes the second part of the process of making change (counting...</em>

3 0
2 years ago
Warning or pop-up that convinces a user that his or her computer or mobile device is infected with a virus or other problem that
o-na [289]
Idk... just dont trust those pop-ups unless your device is acting weird.
3 0
3 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • What qualifies as a dependent (a) 25 year old son/daughter making$5k per year living at home, (b) 21 year old friend going to sc
    10·1 answer
  • ?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
    7·1 answer
  • What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
    11·1 answer
  • Consider the following MARIE Code: 100 If, Load X /Load the first value 101 Subt Y /Subtract the value of Y, store result in AC
    8·1 answer
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • I don't know what to do for these two questions
    13·1 answer
  • Use a while loop to output the even number from 100 to 147? This is python
    10·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
  • what is a simulation? a) simulation is the process of creating dashboards in excel. b) simulation is the process of complex form
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!