1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
12

Think of the silliest problem the problem solving process could help with.

Computers and Technology
2 answers:
arlik [135]3 years ago
5 0

Answer:

if 4 slinkies were put down a set of stairs at different times but reached the bottom at the same time. whats the difference?          

Explanation:

4vir4ik [10]3 years ago
4 0

Answer:

12 FISH ARE IN A BOWL. SOME BIG OTHERS LITTLE IF 5 BIG FISH ATE 2 SMALL FISH EACH HOW MANY FISH ARE LEFT IN THE BOWL ???

PLEASE MARK ME BRAINLIST IF YOU CAN'T ANSWER IT

You might be interested in
This operating system was used by individual computers and required users to type commands.
In-s [12.5K]

Answer:

MS-DOS is your answer

Explanation:

6 0
3 years ago
When you use a rest area, you should:
I am Lyosha [343]
The answer would be A.
The rest seem impractical.
7 0
3 years ago
Read 2 more answers
What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
Greeley [361]

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

  • In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.
  • In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.
  • In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

6 0
3 years ago
In the Database sheet, enter conditions in the criteria range for unoccupied two- and three-bedroom apartments that need to be r
kari74 [83]

Answer:

See attachment fir procedures to get answers.

Explanation:

Given that;

In the Database sheet, enter conditions in the criteria range for unoccupied two- and three-bedroom apartments that need to be remodeled. Enter criteria as text only, without use of quotation marks. Be sure to enter the criteria separately in rows 3 and 4.

See attachment

3 0
3 years ago
I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher refuses to help me and th
user100 [1]

Answer:

it is 29 0ver 30

Explanation:

i took the quiz

5 0
3 years ago
Other questions:
  • Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to
    7·1 answer
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • The implementation stage of the SDLC _____.
    7·1 answer
  • The trigonometry book says: sin^2(t) + cos^2(t) = 1 Write a Python program that verifies the formula with the help of the Python
    11·1 answer
  • What internal hardware device does a computer use to connect to a wired or a wireless network?
    10·1 answer
  • Why did Simon bring Michael home?​
    9·2 answers
  • What does the internet engineering task force (IEFT) do?
    5·1 answer
  • Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
    9·1 answer
  • Jennifer stays fit by playing games that track the movement of her body. Which platform features such a physical interface featu
    15·1 answer
  • 2 4.1.2 Quiz: Information Systems and Business Planning
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!