1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
6

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Computers and Technology
1 answer:
lisov135 [29]3 years ago
4 0

Answer:

Hence f(z)=11

*This is what i think*

You might be interested in
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
4 years ago
legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
AlladinOne [14]

Answer:

Elastic IP address

Explanation:

Elastic IP addresses are static, persistent public IP addresses which can be associated and disassociated with the instance, as required.

This will provide the best failover solution that will keep same IP address on a new instance.

6 0
4 years ago
Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent o
Vitek1552 [10]

Answer:

grip

Explanation:

aaaaaaaaaaaaaaaaaaa

8 0
3 years ago
An example for Shareware?
Kryger [21]
A software that is free of cost for a certain amount of time such as Adobe programs, or Winzip.
6 0
2 years ago
Read 2 more answers
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Other questions:
  • When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages,
    9·1 answer
  • Write a loop to print 10 to 90 inclusive (this means it should include both the 10 and 90), 10 per line.​
    6·1 answer
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
    15·1 answer
  • What is one property of a good hash code?
    11·1 answer
  • Speech about society being normal
    12·1 answer
  • How was the addition of an improvement over early web design?
    11·1 answer
  • Most 4 year colleges want an applicant's scores for all the following except
    12·1 answer
  • What is HTML? (list down any 5 points)
    12·1 answer
  • Why is malware dangerous
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!