1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
5

Helppppppppppp please

Computers and Technology
2 answers:
Lena [83]3 years ago
4 0

Answer:

1.75

Explanation:

It is marked at 3/4 (.75) of the line so it would be 1.75

cestrela7 [59]3 years ago
3 0
The answer is 1.75. You can see where the ruler shows the number one and d is in between 1 and 2. It is not directly in the middle and is at 1.75. I hope this helps you.
You might be interested in
Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
devlian [24]

Answer:

Set the Group field on the Line Items type of Template Content record.

Set the New Quote Group field on each Product record with the associated group name.

Explanation:

The two array that can be implemented are:

  • Set the Group field on the Line Items type of Template Content record.
  • Set the New Quote Group field on each Product record with the associated group name.
5 0
3 years ago
When youre working with a word processing document and you press the Del key what happens
REY [17]
Typically, "Del" stands for "delete."
Most times, this key will do different things depending on the type of keyboard/computer you have. For example, on macs, the "delete" key is also the backspace key, so it will delete the last character you typed. However, on most pcs, the "delete" key will delete characters you typed that are in front of your cursor.
5 0
3 years ago
Why was 1990 an important year regarding air quality?
fredd [130]

Explanation:

The United States created the Environmental Protection Agency. in some ways they have did that

4 0
3 years ago
Read 2 more answers
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
What is the primary purpose of the software package offered by hyper-v called guest integration services?
zysi [14]

Solution:

Guest integration services resolves compatibility issues of certain guest operating systems experiencing non-functioning features.

Data integration service is the employment of a group of services that comply with service-oriented architecture. Data integration service can perform in an N -> 0 latency time period. At the same time, it offers a powerful set of transformation processes for meeting an array of business imperatives. The advantages of employing data integration as an enterprise service include reduced time for marketing, a reduction in total cost of ownership (TCO), and a solution to the obsolete and expensive data-integration patterns presently available in corporate businesses.

This is the required answer.

6 0
3 years ago
Other questions:
  • Pedestrians, cyclists, horse drawn vehicles and wheel chair users are known as ___________
    6·2 answers
  • SMART PEOPLE NEEDED
    11·1 answer
  • When using the “reply all” option, your message will automatically be sent to ____ recipients of the original message. ​?
    7·2 answers
  • 4. An outline is most like which of the following? (1 point)
    14·1 answer
  • The term load is often used to describe opening a page in a ____. Answer
    11·1 answer
  • You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wire
    11·1 answer
  • THIS IS PYTHON QUESTION
    11·1 answer
  • Use ONE SQL statement to show the total number of actual hours for each customer. In the output, show customer id and the total
    15·1 answer
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • (a) List 5 keys we can type with our left hand fingers
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!