1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
2 years ago
7

A bulb has a resistance of 15Ω and is rated at 3A. What is the maximum voltage that can be applied across the bulb?

Computers and Technology
1 answer:
Anastasy [175]2 years ago
7 0

Answer:Wheres the option choice??????????????????????

Explanation:

You might be interested in
Based on your prior knowledge, match each civilization to the region it occupied.<br>​
zhannawk [14.2K]

Answer: Inca- South America

Aztec - Meso America

Explanation:

7 0
3 years ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
2 years ago
Information Governance (IG) consists of? A. the overarching policies and processes to optimize and leverage information while ke
Tems11 [23]

Answer:  A) the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives

Explanation: Information governance(IG) is the act for the information to store , create, archive,deleting, valuing etc.This step is used for making the information secure and optimizable when required. IG gives the control over the information with respect to particular policy.

Other options are incorrect because frameworks used for extraction of  most of IT investments is known as IT(Information technology ) governance and method used for ensuring the data for forming database is known as data governance .Thus, the correct option is option(A).

4 0
3 years ago
40 POINTS PLZ HELP NEED ASAP!!!
dem82 [27]
I Think The answer is c I hope it helps Message Me if I’m wrong and I’ll change My answer and fix it for you
7 0
3 years ago
Other questions:
  • Which of the following is not an impact device?<br> Joy Stick<br> Track Ball<br> Mouse<br> Printer
    10·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
    6·2 answers
  • You disassemble and reassemble a desktop computer. when you first turn it on, you see no lights and hear no sounds. nothing appe
    11·2 answers
  • PLEASE HELP ASAP i will mark brilliant
    12·2 answers
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • How many bytes are in 1 kilobyte of storage
    13·1 answer
  • HOW TO FREE UP RAM/MEMORY ON YOUR DEVICE?
    12·2 answers
  • A student wants an algorithm to find the hardest spelling word in a list of vocabulary. They define hardest by the longest word.
    9·1 answer
  • ____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!