1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
2 years ago
15

Which of the following calculates to 19(3*6)+2/23*(6+2)/2(3*6+2)/23*(6+2/2)​

Computers and Technology
1 answer:
Firdavs [7]2 years ago
3 0

Answer: The first one (3*6)+2/2 will equal 19.

Explanation: If you use the order of operation you would do 3*6 first then add that to 2/2. So it would be 18+1=19.

You might be interested in
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
MAXImum [283]

Answer:

thats what i was about to ask. im not sure

Explanation:

sorry   '-'

3 0
3 years ago
A fitness tracker can be classified as a wearable computer. true
Kay [80]
Depends, but I'd say false.
5 0
3 years ago
Summarize the role of technology in efforts to explore space.
Georgia [21]
The role of technology in efforts to explore space could be argued to say that it has helped us to discover many different planets. An IS is a space station that helps us do stuff!!
6 0
3 years ago
An independent computer program that copies itself from one computer to another over a network is called a ____:
Komok [63]
The answer is trojan horse.
4 0
3 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
2 years ago
Other questions:
  • 3. Discuss the disadvantages of file-based systems.
    13·1 answer
  • What can you do in the Mouse section of the Devices and Printers menu?
    13·1 answer
  • Consists of a drive letter (preceded by a drive name when necessary) and colon, to identify the storage device, and one or more
    5·1 answer
  • Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
    13·1 answer
  • Write the definition of a method named countPos that receives a reference to a Scanner object associated with a stream of input
    13·1 answer
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • Why might you want to save a downloaded file to your computer first instead of running it immediately?
    6·1 answer
  • When right-clicking an object, a ____ menu appears, which contains frequently used commands related to the object.
    7·1 answer
  • During the maintenance phase of the sdlc, the team must _____ if a system's objectives are not being met
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!