1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
10

What does 2/12 mean in time?????

Computers and Technology
1 answer:
lina2011 [118]3 years ago
5 0
2:12 hope this helps
You might be interested in
Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
tia_tia [17]

Answer: True

Explanation:

Yes, the given statement is true that that one of the quality of the wireless networks is that they uses the various radio techniques and the radio frequency.

 By using this techniques, the wireless transmission occur and it enable the connectivity and allow the direction of transmission to eavesdrop. It is one of the best technique as compared to the traditional method which include copper and fiber.

6 0
3 years ago
The objects that you place on master pages are called _____.
Studentka2010 [4]
The answer to this is A.
3 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Write an application that allows a user to enter the names and birth dates of up to 10 friends. Continue to prompt the user for
mylen [45]
Sorry I don’t know the answer I am really sorry
5 0
3 years ago
If you get musicilly can your parents see
Tresset [83]
I wouldn't think so unless they have access to your phone or account. But I don't believe this is school related.
6 0
3 years ago
Read 2 more answers
Other questions:
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • How to make logo black and white in paint?
    14·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • Who is hurt by piracy
    10·1 answer
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • Please help!
    10·2 answers
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!