1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
5

Algorithm 1$ =RS 150​

Computers and Technology
2 answers:
Ilya [14]3 years ago
8 0

Answer:

73.80 Indian Rupee

Explanation:

The rupee is subdivided into 100 paise.

Dmitry [639]3 years ago
6 0

Answer:

Are you talking about ROBUX? lol

Explanation:

You might be interested in
Describe the benefits and drawback of using virtualisation on a single machine and also in a cluster environment
Sedbober [7]

Answer:

 Virtualization is the technology that is used to create virtual representation and version of the different devices like software, many storage devices and server.

It also help in organize the working framework where the structure isolates the asset into at least one execution situations.

 The benefits of using the virtualization on the single machine are:

  •  The virtualization increased the productivity when it used in the cluster environment.
  •  We can able to access the different resources faster.
  •   The data center management is simple while using the virtualization in the cluster environment.

 The drawback of using virtualization on single machine are:

  • The virtual machine is less efficient as compared to the real machines.
  • The virtual machine indirectly access the computer hardware system so that is why it is less efficient and also consume more power to run the system.  

5 0
3 years ago
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
Kaylis [27]

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

8 0
3 years ago
Read 2 more answers
A(n) _______________ loop usually occurs when the programmer forgets to write code inside the loop that makes the test condition
Serggg [28]
Infinite





,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
5 0
3 years ago
​some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
Galina-37 [17]

GUI, AKA Graphical User Interface

3 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • The magnavox odyssey was a commercial success
    13·1 answer
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    10·1 answer
  • On Brainly, how can I change my username? from halfsidepancake​
    6·2 answers
  • How can our perceptions help us to choose the channel for our message?
    5·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • Describe the different
    12·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • What were the names of Henry VIII's six wives?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!