1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
15

It takes an older computer twice as long to send out a company's email as it does a newer computer. Working together, it takes t

he two computers 10 minutes to send out the email. How long will it take the older computer to send out the email on its own?
Computers and Technology
1 answer:
bulgar [2K]3 years ago
4 0

Answer:

13,33  MIN.

Explanation:

1. Time with Older Computer (OC) = 2 time with New Computer (NC)

2. OC+ NC = 10 MIN.

replacing 1. in 2.    OC + OC/2 = 10 min.  

1.5 OC =10min

OC=6.66 MIN

NC = 3,33 MIN.

If we replace NC with OC , 3,33 min will take 2 times (6,66 min)

Total Time = 6,66 + 6,66= 13,33 min

You might be interested in
How do you go about inserting additional worksheets into a workbook?
kicyunya [14]
The correct answer is D. All of the methods listed above are ways of inserting new sheets into a workbook.
6 0
3 years ago
How are the functions different and how do i determine the answer
worty [1.4K]

Answer:

this isn't a fair question...

you'll either get 2,3 or 4

not a nice question

3 0
3 years ago
A customer has a new laptop with wireless WAN capabilities; however, the software does not connect to the Internet. What would y
LUCKY_DIMON [66]

Answer:

Check below for the explanation

Explanation:

The following suggestions will be given to the customers:

  • Go to network settings and check the WIFI settings to confirm whether the WIFI connection is on. Switch the WIFI to the on position if it is off.
  • The customer should check if the wireless driver is installed on the computer, if the driver is not installed, he should try to install it
  • The customer should check all the available access points and confirm if their signal strengths are strong enough to allow for any connections. Restart the access point to enhance proper connection.
  • Check to see if your operating system is updated to support your internet connection. You can update your operating system to the latest version
  • Run a Network Diagnostics on your computer. This will run a couple of tests to see what’s possibly causing your Wi-Fi issues.
5 0
3 years ago
What is the relationship between CAD and CIM ?
Marat540 [252]
<span> CAM( computerised Aided Manufacture) is when you have workers being helped by computerised tools, CIM (computerised intergated manufacture) is when the whole process is computerised, in manufacture this usually uses robotic arms. These can manufacture 24/7 in needed, they can work very accurately ( they are faster and stronger than a human arm) </span>
5 0
3 years ago
Read 2 more answers
What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important?
Taya2010 [7]

Marina and Rita’s Cupcakes use the IMAP email protocol. It is important since it stores copies of all the emails stored on the server.

 

To add, IMAP<span> (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages,</span>

8 0
3 years ago
Other questions:
  • Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of
    8·1 answer
  • Which of the following is NOT an ethical way of getting to the top of a web search?
    5·1 answer
  • Who create and developed castlevania?
    7·1 answer
  • Project Description The Department plans to purchase a humanoid robot. The Chairman would like us to write a program to show a g
    15·1 answer
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • A hacker uses a valid IP address of an internal host, and then from an external system, the hacker attempts to establish a commu
    11·1 answer
  • The seven basic parts of a computer are
    10·2 answers
  • PowerPoint is best described as:
    13·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!