1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
2 years ago
9

24/3*2^2/2*3+(20-10)-40

Computers and Technology
1 answer:
ycow [4]2 years ago
8 0

Answer:

34

Explanation:

You use pemdas

You might be interested in
How do i find the greatest common factor of two numbers?
Lilit [14]
You can list the numbers . keep listing them till you find the same numbers
8 0
2 years ago
ISO 400 is twice as sensitive and ISO 100 true or false
beks73 [17]

Answer:

Quite simply, when you double your ISO speed, you are doubling the brightness of the photo. So, a photo at ISO 400 will be twice brighter than ISO 200, which will be twice brighter than ISO 100.

Explanation:

ISO most often starts at the value of ISO 100. This is the lowest, darkest setting, also called the base ISO. The next full stop, ISO 200, is twice as bright, and ISO 400 is twice as bright than that. Thus, there are two stops between ISO 100 and 400, four stops between 100 and 1600, and so on.

4 0
2 years ago
You work as the IT administrator for a small corporate network. To accommodate specific network communication needs for an upcom
Andreas93 [3]

Answer:

The right answer is option A

Explanation:

To upgrade a network communication to accommodate for specific network needs, what is required is to select and install the network interface with the highest speed to connect to the local network.

Network communications are what we use to connect to the internet. There are different network providers and the provided networks do not have the same network speed due to different reasons. A network interface is what is used to connect our computer to the network provider. It is only logical to get the best network interface card in that region and connect to the fastest speed available.

5 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
What is the other name of iterative staatement ​
Mademuasel [1]

Answer:

An loop statement

Explanation:

An iteration statement, loop, repeatedly executes a statement, know as a loop body,until the controlling expression is false

8 0
2 years ago
Other questions:
  • Periodically adding, changing and deleting file records is called file. A) Updating B) Upgrading C) Restructuring D) Renewing E)
    10·2 answers
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • Mobile apps known as news _________ collect articles from a variety of sources and present them to you in a magazine-style forma
    7·2 answers
  • How prevalent is licensing for software engineers in the United States
    5·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • What types of information are commonly included in headers and footers? Check all that apply.
    10·1 answer
  • :P 80 points to spare so i guess its free!!!!!!
    9·2 answers
  • If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file ca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!