1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
12

Which measurement symbol is this?PLS HELP ME​

Computers and Technology
2 answers:
andreev551 [17]3 years ago
6 0

Answer:

hi! can you please leave the symbol so I can help you??

Explanation:

Greeley [361]3 years ago
5 0
Answer


Step by step:

Although unit names are ordinary words, note that unit symbols are just that (symbols) and not abbreviations. They

are case-sensitive: uppercase and lowercase letters have different meanings—for example, mm is the millimetre (one-thousandth of a metre), but Mm is the megametre (one million metres);
don’t have singular and plural forms: it’s 1 km, 2 km (no “s” at the end);
have spaces before them: it’s 1 km, not 1km; and
don’t have periods / full stops after them (unless they happen to fall at the ends of sentences).
For more details on usage, including some common errors, read the USMA’s page on correct metric usage. In addition, the FAQ includes some information on usage. For information on typing symbols properly, see How can I type unit symbols such as m2, °C, N⋅m, and µm? in the FAQ.
You might be interested in
Explain the steps you take when conducting research online to ensure it the source is providing reliable information.
Gala2k [10]

Answer:

Author

Date and

Source

Explanation:

Author – Information on the internet with a listed author is one indication of a credible site. ...

Date – The date of any research information is important, including information found on the Internet. ...

Sources – Credible websites, like books and scholarly articles, should cite the source of the information presented.

5 0
3 years ago
Which of the following is NOT true about functions? They go below the main program in the source code file. They do a single tas
Charra [1.4K]

Answer:

First-line i.e, "They go below the main program in the source code file" is the correct answer.

Explanation:

A method is a set of instruction, that can be used in a program whenever we need, it can be divided into two parts user define and built-in. In user define method three-point are very important, that are method definition, declaration, and calling.  

  • These types of methods should be declared and defined above the main method, and it calls inside the method.
  • It also known as a mini-program because it is used to perform a specific task.
  • Both users define and built-in is a collection of the commands.

4 0
3 years ago
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
4 years ago
How to calculate 100MB at 56 Kbps to transfer time?
Gelneren [198K]
1MB=1000 kb 

\frac{100*1000Kb}{56Kb/s} ≈ 1748,71 seconds 


ransform in kilobyte and share knowing transfer time :)
3 0
3 years ago
Jennifer has her own business. Recently, she has ventured into creation of a new line of apparel. She has created a new symbol t
Zolol [24]
I am think that is the anwer trademark
3 0
3 years ago
Read 2 more answers
Other questions:
  • 5. You just bought a new hard drive for your computer. You plan to use this as a secondary hard drive to store all your UMA file
    14·1 answer
  • In what era did plants begin to flourish?
    9·1 answer
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • Software people commonly use in the workplace to make their life easier is called?
    11·2 answers
  • What are two most common video file formats
    11·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!