1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
6

there are 3 numbers X,Y,Z such that twice X is equal to therice Y and four times Y is equal to five times Z. the ratio between X

and Z is?​
Computers and Technology
1 answer:
777dan777 [17]3 years ago
3 0

Step-by-step explanation:

2x = 3y

4y = 5z

x = 3y/2

z = 4y/5

ratio between x and z is 15 : 8

You might be interested in
IRQ 0 interrupt have _______________ priority<br> ? low<br> ? medium<br> ? highest<br> ? lowest
tekilochka [14]

Answer:

Highest

Explanation:

A interrupt request / IRQ is in which instructions are sent to Cpu and uses an interrupt handler to run distinct program . Hardware interrupts are used to manage occurrences such as obtaining modem or network card information, important presses, or mouse motions.

  • Interrupt request 0. – it is a system timer (can not be altered)
  • Interrupt request 1 – keyboard controller (can not be changed)
  • Interrupt request 2 – cascaded IRQ 8–15 signals (any device configured to use IRQ 2 will genuinely use IRQ 9)
  • Interrupt request 3 – serial port 2 controller
  • Interrupt request 4 –  serial port 1 controller
  • Interrupt request 5 –parallel port 2 and 3
  •  Interrupt request 6 - floppy disk controller
  •  Interrupt request 7 –parallel port 1. If a printer is not present, it is used for printers or for any parallel port. It can also possibly be shared with a secondary sound card with cautious port management.

As interrupt number increases priority level decreases, Priority level 0 is the highest priority level .

4 0
3 years ago
Search engines use indexes created by web _________ to provide fast searches.
Nastasia [14]
Search engines use indexes created by web crawlers to provide fast searches.
3 0
3 years ago
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
frozen [14]
Spam refers to large unsolicited email irregardless of the recipients views on the matter
5 0
4 years ago
Who wrote the book of luke​
netineya [11]
Luke himself wrote t the book
5 0
2 years ago
Other questions:
  • Melissa and Sue want to show a presentation to twenty employees using a presentation while using a projector. They learn that th
    12·2 answers
  • What new deal programs were created to build dams to control flooding and generate electric power?
    13·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    12·1 answer
  • A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encrypti
    5·1 answer
  • Create a class named Console, and move all the methods that retrieve and validate user input to that class. These methods can re
    7·1 answer
  • What is boolean rules​
    12·1 answer
  • Apps are designed by___.
    11·2 answers
  • A swimming pool has a length of 28 feet, a width of 17 feet, and a depth of 6 feet. How much water can the swimming pool hold?
    10·1 answer
  • 9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF functi
    9·1 answer
  • How are digital and analog data similar? How are they different?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!