1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
2 years ago
6

The number 68 is increased to 73. What is the percentage by which the number was increased, to the nearest tenth of a percent?

Computers and Technology
2 answers:
Ipatiy [6.2K]2 years ago
7 0
Correct answer should be 1.1%
julia-pushkina [17]2 years ago
6 0
1.1 is the answer but if we used % it could be 1.1%
You might be interested in
Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
valentina_108 [34]
My opinion a background check and take another friend with you.
4 0
3 years ago
Read 2 more answers
What is a 96.1791 weighted gpa in a 4.0 scale?
Oksanka [162]

Answer:

3.85 out of 4

Explanation:

As 96.1791 out of 100 gives 96.1791% calculated below:

Percentage formula: (Obtained value/total value)*100.......eq(1)

Putting values:

= (96.1791/100)*100

= 96.1791%

Now finding 96.1791% of 4:

Putting values in eq (1):

96.1791% = (Obtained value/4)*100

96.1791/100= (Obtained value/4)    (dividing by 100 on both sides)

0.961791 = (Obtained value/4)

4* 0.961791 = Obtained value          (multiplying 4 on both sides)

3.847164 = Obtained value

Then 96.1791% of 4 will be equal to: 0.961791 * 4  = 3.847164

Rounding off the answer to 2 decimal places:

=3.85    (As the digit on 3rd decimal place is greater than 5)

4 0
3 years ago
Test unit 8 edhesive answers ​
True [87]
What are the questions
7 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
"what windows process is responsible for authenticating users?"
Likurg_2 [28]
Lsass.exe /................................................
8 0
3 years ago
Other questions:
  • Which of these statements is true?
    9·1 answer
  • What might be the best response to a cyberbuly attack
    6·2 answers
  • In a social networking site your personal information is listed under your inbox. home. status. profile.
    11·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • Write a program that outputs inflation rates for two successive years and whether the inflation is increasing or decreasing. Ask
    9·1 answer
  • Question No. 5:
    7·1 answer
  • Five technology tools and their uses​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!