1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
2 years ago
6

Salvado has a flash dish of is GB

Computers and Technology
1 answer:
exis [7]2 years ago
6 0

Answer:

About 1,655 files or exactly 1655.646315789473684210526315785

1578

Source(s):

1.5 gb = 1,500 mb<---wrong right --->1536

Explanation:

You might be interested in
legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
AlladinOne [14]

Answer:

Elastic IP address

Explanation:

Elastic IP addresses are static, persistent public IP addresses which can be associated and disassociated with the instance, as required.

This will provide the best failover solution that will keep same IP address on a new instance.

6 0
3 years ago
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Sergeu [11.5K]

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

6 0
3 years ago
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Reptile [31]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
5 0
3 years ago
Properly worn safety belts help prevent
marissa [1.9K]

Answer:

True

Explanation:

This one was a bit tricky because I've never heard that as a feature, but it is true that they could be of help.

5 0
2 years ago
Read 2 more answers
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
3 years ago
Other questions:
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • The manager of a sports club has data about the club members' ages in a workbook. He wants to find which age is most common. Whi
    13·2 answers
  • Stephen needs to insert a field into a building block that will contain variable data. Which keyboard shortcut can he use to tog
    6·1 answer
  • Where can you find your EFC
    8·2 answers
  • How will you ensure that all of the network's applications and tcp/ip services also support ipv6?
    10·1 answer
  • How does the system work for this:
    15·2 answers
  • To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on
    7·1 answer
  • PLEASE HURRY!!!!
    8·2 answers
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
  • television broadcasts were originally delivered by using which technology? ethernet wireless coaxial cable broadband
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!