1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
14

Hey, can you guys please help me please??

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
8 0

Answer:

17

Explanation:

(3*5) + (1+1) = 17

You might be interested in
Which of the following statements is/are true by definition.
Rudik [331]

Answer:2. electrical equipment shall be considered readily accessible to those to whom ready access is requisite when it is capable of being reached quickly for operation by using a portable ladder.

Explanation:

3 0
3 years ago
Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restri
trapecia [35]

Answer:

B

Explanation:

Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restrictions? A. Adding a chart object B. Adding an Access object C. Adding a Word object D. Adding an Excel object microsoft word

Answer: B

6 0
3 years ago
In 1839, Talbot released the paper-based process which he called _ to the public.
vlabodo [156]

Answer:

I'm pretty sure it's photogenic drawing.

7 0
3 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
Behave online in the same way as you wish to be treated true false​
Yuliya22 [10]

True; you have treat others the way you want to be treated. It is the golden rule for meeting anyone, whether it's online or in real life. If you were being mean to someone online, would you want someone to be mean to you the same way you were mean to that person? So, the answer is true.

5 0
3 years ago
Other questions:
  • For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell
    12·1 answer
  • Name the main technology used to connect computers to devices
    6·1 answer
  • A0domain indicates that the computer or DNS name does not exist.
    7·1 answer
  • When an object is created, the attributes associated with the object are called: A. instance fields B. instance methods C. fixed
    11·1 answer
  • Write a program that prompts the user to enter a number then counts the number of odd numbers and even numbers the user enter. T
    15·1 answer
  • Please answer<br><br>NO LINKS​
    7·1 answer
  • Uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs
    14·1 answer
  • PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regardi
    7·1 answer
  • Who is considered as the father of computer science?​
    11·1 answer
  • What is the full form of SAARC<br><br>And free point!! ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!