1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
12

Which measurement symbol is this?PLS HELP ME​

Computers and Technology
2 answers:
andreev551 [17]3 years ago
6 0

Answer:

hi! can you please leave the symbol so I can help you??

Explanation:

Greeley [361]3 years ago
5 0
Answer


Step by step:

Although unit names are ordinary words, note that unit symbols are just that (symbols) and not abbreviations. They

are case-sensitive: uppercase and lowercase letters have different meanings—for example, mm is the millimetre (one-thousandth of a metre), but Mm is the megametre (one million metres);
don’t have singular and plural forms: it’s 1 km, 2 km (no “s” at the end);
have spaces before them: it’s 1 km, not 1km; and
don’t have periods / full stops after them (unless they happen to fall at the ends of sentences).
For more details on usage, including some common errors, read the USMA’s page on correct metric usage. In addition, the FAQ includes some information on usage. For information on typing symbols properly, see How can I type unit symbols such as m2, °C, N⋅m, and µm? in the FAQ.
You might be interested in
Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
Novosadov [1.4K]

There are reasons why a statement can be wrong. The option that is a wrong statement is Since 2015, the number of unfilled cybersecurity positions has increased by 10 percent.

<h3>How are many cybersecurity jobs unfilled?</h3>

The U.S. is known to have a high total employed cybersecurity workforce and some that are unfilled positions as reported by Cyber Seek.

Studies has shown that since 2015, the number of unfilled cybersecurity positions has gone up by 50 percent. Such that  the total expected rate has been approximated to be at 1.8 million open cybersecurity positions by 2022.

Learn more about cybersecurity from

brainly.com/question/14286078

8 0
2 years ago
Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
Vedmedyk [2.9K]

Answer:

Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the prototype (activity 2), and test the prototype (activity 3). activity 1 is the predecessor for activity 2 and activity 2 is the predecessor for activity 3. if the prototype fails testing, bill must redesign the prototype; therefore, activity 3 is a predecessor for activity 1. this is an example of

b. looping

Explanation:

  • The given example is of looping because each activity is leading to another activity on the completion of some conditions.
  • The answer a is not valid as it is not just an example of conditional statements rather it is a loop which will keep moving until unless reached a situation to end it.
  • The option c, d an e are not right options for the given example.
4 0
4 years ago
Tạo thủ tục có tên _Pro04 để trả về số lượng tổng thời gian tham gia dự án Y của nhân viên có mã số X, với X là tham số đầu vào,
kompoz [17]

Answer:

nigro

Explanation:

6 0
3 years ago
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
List one way to convey professionalism to the reader of a document.
Ray Of Light [21]
Abstain from contractions like “couldn’t” or “should’ve” and use “could not” or “should have” instead
4 0
3 years ago
Other questions:
  • Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in
    11·1 answer
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations. A. News sites B. Sear
    5·2 answers
  • Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than hav
    7·1 answer
  • How can you have a safe browsing experience
    5·1 answer
  • In our networked world, we have more opportunities to stereotype, which is problematic because:
    7·2 answers
  • The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
    15·1 answer
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • Point out the wrong statement.
    10·1 answer
  • Developing algorithms using psuedocode
    15·1 answer
  • Accept total number of participants (B) in class. A group of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!