1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
10

JizActive23- 2(7 - 15)What is the value of4​

Computers and Technology
2 answers:
hodyreva [135]3 years ago
7 0
- 2(7) - 15) is the answer i believe
-Dominant- [34]3 years ago
3 0

Answer: I think it is c

Explanation: hope this helps

You might be interested in
안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101
sashaice [31]

Answer:

i think its 01100001

Explanation:

4 0
3 years ago
Read 2 more answers
How many instructions could fit into a 256 byte memory unit, given a 32-bit architecture?
andriy [413]

Answer:

64

Explanation:

We have given the 32 bit architecture

We know that 1 byte =8 bit

So memory of given architecture 32 bit \frac{32}{8}=4bytes

Total memory = 256 bytes

So total number of instruction that fit into 256 bytes \frac{256}{4}=64

So total 64 instruction can be fit in 256 byte memory.

3 0
3 years ago
How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help
kompoz [17]

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

5 0
3 years ago
Logical are functions used when looking for an entry or value in the spreadsheet. what is it?
Mila [183]

Explanation:

Logical functions provide decision-making tools for information in a spreadsheet. They allow you to look at the contents of a cell, or to perform a calculation, and then test that result against a required figure or value.

5 0
3 years ago
List three ways on how it's good to meet online and real life
nikitadnepr [17]

Answer:

Explanation:

How to meet people in real life

1. We can meet people if you go to your friend's party, is a great opportunity to meet friends from your friends.

2. We must go to events, in this case, if you like to read books, go to reading events.

3. We can use public transportation if you see someone reading your favorite book is the best opportunity.

How to meet people online

1. We can meet people in social media, but there are a lot of fake accounts, take care.

2. There are special platforms to meet people or to find love.

3. We could meet people on educational websites or apps, for example, if we want to learn Spanish, we can meet Spanish people.

3 0
3 years ago
Other questions:
  • Which Internet resource can you use to publicly describe an adventure trip you recently made?
    9·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line
    10·1 answer
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • Why Java Script uses the prefix Java in itsname?
    15·1 answer
  • 2 ways to assign a value to a variable
    6·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0,
    13·1 answer
  • The decimal number 3 is ___ in binary the 2s column plus the 1s column.
    11·1 answer
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • Select the correct answer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!