1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
2 years ago
14

Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How

Computers and Technology
1 answer:
Nina [5.8K]2 years ago
8 0

Answer:

50

Explanation:

He bought 25 dozens of eggs:

25 (12) = 300

He used 6 eggs to make 1 cake, so:

300 eggs/6 eggs per cake = 50 cakes

You might be interested in
One of the original forms of viruses, is usually stored on some form of removable media. When the removable media is connected t
Paladinen [302]

Answer:

Boot sector virus

Explanation:

A boot sector virus is a virus which functions is to infects the sector of the boot  of floppy disks of hard disks in which they use DOS commands to spread to other floppy disks and they tend to  either copies the master boot program to another part of the hard disk or try to overwrites it which is why they are said to always infect a computer when it boots up as well as when it accesses the infected floppy disk in the floppy drive. Although BOOT SECTOR VIRUS are difficult to remove because most antivirus programs cannot clean the MBR while the windows is running reason been that it takes bootable  antivirus disks to properly remove a boot sector virus.

Hence with BOOT SECTOR VIRUS newer versions do not need to be booted due to the fact that they often have to reside on the removable media, such as on a flash drive especially in a case when the Computer systems are typically infected by these viruses. 

4 0
3 years ago
True false.
snow_lady [41]

Answer: true

Explanation:

5 0
3 years ago
Read 2 more answers
Matching: match each step with its correct sequence number. This question tests whether you know the order in which a CPU perfor
Ganezh [65]

Answer:

1. The CPU fetches from the memory the instruction

2. The CPU decodes the instruction

3. The CPU fetches the operands (if needed)

4. The CPU executes the instruction

5. The CPU writes back the result(s)

6. The CPU updates itself to fetch the next instruction (Jump to Step 1)

Explanation:

The instructions are saved in the memory, so they need to be in the processor to get a result. But before doing anything, the CPU must decode it to "understand" it. If the instruction contains any logic or arithmetic operations, the Arithmetic Logic Unit (ALU) will do that job. Then, the CPU executes the instruction and writes back to the memory the result. As the last step, the Program Counter is updated to the memory adress of the next instruction.

3 0
3 years ago
According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
kolbaska11 [484]
Found the same question with the choices;

A. Reason Effectively
B. Solve Problems
C. Communicate Clearly
D. Use System Thinking

I would say the answer is  A.
6 0
3 years ago
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
3 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • A hard drive cannot be partitioned until the device _________ is set.
    15·1 answer
  • 4+4 act quick for brainliest
    10·2 answers
  • Assume you have a int variable n that has already been declared and initialized. Its value is the number of integers that need t
    13·1 answer
  • Which type of computer is the best? laptop, tablet, or desktop
    15·2 answers
  • Kim would like to have a simple method for entering data into a database. She should create a _____.
    14·2 answers
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • Which code will print a random number between 1 and 100?
    15·2 answers
  • _______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
    11·1 answer
  • What are the data type(s) will be used to declare the variable(s) needed to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!