1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
10

Jose has 3/5 kilogram of peppermints and 2/3 kilogram of candy canes. How many kilograms of candy does he have?

Computers and Technology
1 answer:
yarga [219]3 years ago
6 0

Answer:

\frac{19}{15}\\

≅ 1.267

Explanation:

\frac{3}{5} +\frac{2}{3} \\\\= \frac{9}{15} + \frac{10}{15} \\\\= \frac{9+10}{15} \\\\= \frac{19}{15} \\\\= 1.267

You might be interested in
Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation throughout a document. Which
Ivan

Not really is she wants the words that she's typing down sometimes it's not necessary to leave it to the auto correct It can always be bad when re-reading it again.

5 0
3 years ago
What does mean I can’t turn on my computer and my computer won’t charge at all
Dmitrij [34]

Explanation:

well that happened to me to and what my dad did was to cut the cable and fix it,it worked.Ithink my situation is very different than yours but you cantiue to see what else it says and if you want to you can text me back.

5 0
3 years ago
A) Describe how an attacker can obtain the one-time pad that is used to encrypt a message, given both the message and the cipher
erastovalidia [21]

Answer:

(a)

Assuming the one-time pad P is used to XOR the message M to get ciphertext C, the following holds:

M ⊕ P = C

P = C ⊕ M

this is a basic property of how XOR works.

(b)

P = M1 ⊕ C1

then M2 = C2 ⊕ P

(c)

The attacker can make assumptions about the message (e.g., presence of certain words and spaces) and then calculate which pad would be needed to get them in the ciphertexts. He then has two ciphertexts that should yield valid content, making it much more easy to guess the pad.

Explanation:

5 0
3 years ago
As which printers are ink-jet printers or band printers classified?
Anestetic [448]
I think character printers
5 0
4 years ago
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
Travka [436]

Answer:

denial of service

Explanation:

3 0
3 years ago
Other questions:
  • Which of the following is not a standard method called as partof the JSP life cycle?
    5·1 answer
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • An auxiliary view is always projected from the view that shows the inclined surface as a(n) _____.
    14·1 answer
  • If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.
    8·1 answer
  • It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
    5·1 answer
  • Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the com
    14·2 answers
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • Write the application of computer in education and communication​
    9·1 answer
  • Explain why the scenario below fails to meet the definition of a stakeholder.
    5·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!