1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
15

This is science I just couldn’t find it

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
7 0

Answer:

69

Explanation:

It is 69 because it is the most for that degree.

You might be interested in
The type of meter used to test downstream digital signal quality
Levart [38]
I would say digital modulated signals  <span />
3 0
4 years ago
The strategy in which you periodically look away from the text and ask yourself about the material is called the
Monica [59]
<span>The strategy in which you periodically look away from the text and ask yourself about the material is called the look-away method.</span>
8 0
3 years ago
Read 2 more answers
What is and effective way to display calculation in a word document?
Tju [1.3M]
You only put a numerical expression in  numbers if it is over 100, it the calculation correctly.
<span />
8 0
4 years ago
What medium allows for electronic delivery of DTP content without the need for any physical media?
Lostsunrise [7]
Email? Dropbox?...Not sure give one of these a try? Hope this helps
0 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • Color of seagrass beds on navigational charts? Please quickly
    12·1 answer
  • The smallest network
    13·1 answer
  • Three business partners are forming a company whose name will be of the form "name1, name2 and name3". however, they can't agree
    13·1 answer
  • A GPO component that’s an Active Directory object stored in the System\Policies folder. The GPC stores GPO properties and status
    14·1 answer
  • Way to minimize technical problems with your computer
    6·1 answer
  • Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w
    11·2 answers
  • Which of the follow efficiencies would be considered unreasonable?
    13·1 answer
  • Which symbol shows an input?
    13·1 answer
  • Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Desc
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!