1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
10

How to you compute for the total room sales​

Computers and Technology
1 answer:
Furkat [3]3 years ago
7 0

Answer:

[checking question] - Error:

Please give complete/specific questions so more brainies will be able to help you! Check out what makes a great answer/question here: https://faq.brainly.com/hc/en-us/articles/360010136959-Answering-Guidelines ߷

You might be interested in
Help meeeeeeeeeeeeeee please​
bija089 [108]

Answer:

Explanation:My explanation is above my comment :)

3 0
4 years ago
Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
nikklg [1K]

Answer:

Algorithms.

Explanation:

Computer system is an electronic machine that receives input data, processes or executes these data and outputs the results. It comprises of two parts, the hardware and software components.

The computer receives data created by a process and inputted by individuals. The software components are the operating system and the application softwares running in the operating system. The application software follows a well defined stages of task to execute a task. This is called algorithm.

The application uses the algorithm to execute the task on the input data to give the required result.

8 0
3 years ago
g How safe is to have a LinkedIn account where you have published all the important information about yourself
irina [24]

Answer:

LinkedIn is very safe

Explanation:

LinkedIn is very safe, that being said you should never post private information about yourself anywhere that you do not want others to see/know. LinkedIn is a job recruiting and networking site, meaning that all the information that you have or will be publishing there should be related to your career. There is no reason for you to publish private information such as document numbers, social security number, address, bank account info, etc.

5 0
3 years ago
Read 2 more answers
Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
11111nata11111 [884]

Answer:

The answer is "Virtual supercomputer"

Explanation:

A supercomputer is a machine with or close to a maximum fastest operating output. It commonly used in science and engineering systems, that have to manage or calculate massive server numbers.

  • A virtual supercomputer is also known as a cloud device.  
  • It gives you to the platform, and provides you a built-in cloud environment, by mixing different virtual servers.
  • Its rebellion is to be used by individuals.

3 0
4 years ago
if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
galina1969 [7]

The NMap procedure that can be used to help you to gain information about remote *nix hosts is Script Scanning

<h3>What is script scanning?</h3>

The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Therefore, The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Learn more about Script Scanning from

brainly.com/question/18152781

#SPJ11

4 0
2 years ago
Other questions:
  • Where would be the most likely place to find the keyboard combination used to toggle a keyboard backlight on or off?
    8·1 answer
  • If you want to access your files anywhere from almost any connected device, you should store your files on your ________.
    9·1 answer
  • The Constitution party advances a conservative approach to issues and would most likely support policies that __________.
    10·1 answer
  • In gaming, "rendering" refers to:
    12·2 answers
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • Which of the following processes should angel use to merge cells a1:d4 to create a title
    15·1 answer
  • Java code?????
    12·1 answer
  • Apakah kebaikan mengetahui fungsi elemen pada produk mekatronik​
    5·1 answer
  • Fill in the blacks
    13·1 answer
  • Please give me a answer correctly​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!