1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
2 years ago
10

Helpppppppppppppphuhuh

Computers and Technology
1 answer:
Serga [27]2 years ago
3 0

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

You might be interested in
FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
Mekhanik [1.2K]

Answer:

Look down below for answer!

Explanation:

1. The internet has backup files and a greater authoritative figure can easily see the history on the photo, etc. Some apps have save files no matter what and can track the post, photo, and when and why it was deleted. The impression the photo left on people may not be left either.

2. The zoo can be breaking the law because even though they store the information safely, they do not have the visitors consent to having their information.

7 0
3 years ago
Read 2 more answers
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
Ahat [919]

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

4 0
3 years ago
What are some signs that could help you determine that a date and time was inserted as a special object instead of
Jlenok [28]

Answer:

i) It is difficult to put the mouse pointer's insertion point in the text

ii) A gray border appear around the time and date when you point to it

Explanation:

When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application

The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the  text

Therefore, the correct options are;

<em>It is difficult to put the mouse pointer's insertion point in the text and</em>

<em>A gray border appear around the time and date when you point to it.</em>

3 0
2 years ago
Name the major types of computer systems from slowest to fastest. ​
Vadim26 [7]

Answer:

Cache is the fastest and most expensive, RAM is slower and less expensive, and virtual memory is the slowest and least expensive type.

Explanation:

3 0
2 years ago
The dns server translates the URL into the IP address 8.8.8.8. What is the next step in the process?
geniusboy [140]

Answer:

The web browser sends an HTTP request to the IP address, the IP address then sends the content that are displayed by the browser

Explanation:

The process of converting the typed in URL to a displayed page is as follows;

1) The typed in URL is sent to a DNS recursor by the browser

2) The recursor gets the DNS record for the domain from the cache if the record is cached or when the DNS record for the domain is not cached, the recursor makes a requests to the DNS root from which the name of the TLD nameserver is received

3) The TLD nameserver is contacted by the resolver to obtain the authoritative nameserver's IP address

4) With the information, the resolver contacts the authoritative nameserver and obtains the domain's IP address for the domain the resolver contacts

5) The obtained IP address for the URL's domain is then sent to the browser by the resolver

6) An HTTP request is sent by the browser to the IP address and the data received by the browser from that IP address is rendered and seen as the page content.

6 0
2 years ago
Other questions:
  • For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
    13·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • How should font appear in a slide presentation compared to the font in a document
    7·1 answer
  • If you go over 255 in RGB by 1 does it reset to 0 or 1
    11·1 answer
  • Is a psychrometer more likely used at a beach or a desert in California
    12·1 answer
  • This isn't a question
    8·1 answer
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access
    11·2 answers
  • Meaning and explanation of fortran​
    11·2 answers
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!