1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
3 years ago
9

I need the answer asap !!!!

Computers and Technology
1 answer:
kirill [66]3 years ago
4 0

Answer:

40% divided by 50,00

Explanation:

Sorry its not straight to a answer man

You might be interested in
which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b.
7nadin3 [17]

Answer:

D) Procedural

Explanation:

7 0
3 years ago
A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him
DerKrebs [107]

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

3 0
2 years ago
___________ are the constant values that are used in a program. ​
77julia77 [94]

Answer: Data

Explanation:

3 0
3 years ago
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
Where do we manage POS? ​
valkas [14]

Explanation:

<em>The</em><em> </em><em>POS</em><em> </em><em>serves</em><em> </em><em>as</em><em> </em><em>the</em><em> </em><em>central</em><em> </em><em>component</em><em> </em><em>for</em><em> </em><em>your</em><em> </em><em>business</em><em>;</em><em> </em><em>it's</em><em> </em><em>the</em><em> </em><em>hub</em><em> </em><em>where</em><em> </em><em>everything</em><em> </em><em>like</em><em> </em><em>sales</em><em>,</em><em> </em><em>inventory</em><em> </em><em>management</em><em> </em><em>,</em><em> </em><em>payment</em><em> </em><em>processing</em><em>,</em><em> </em><em>and</em><em> </em><em>customer</em><em> </em><em>management</em><em> </em><em>merges</em><em>.</em><em> </em>

3 0
3 years ago
Other questions:
  • Explain how do we combine multiple Boolean values?​
    5·1 answer
  • ?trophic levelNYIGVU.;/IO9YK7,'0;
    12·1 answer
  • What does the following code alert?
    10·2 answers
  • If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic
    14·1 answer
  • PowerPoint SAM Capstone Project 1 can PLEASE someone do it for me I have some directions like steps and you just have to do it i
    10·2 answers
  • Read the scenario and then choose which type of
    12·2 answers
  • Answers for this question​
    11·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
  • What is an example of new technology having a negative impact on sustainability?.
    6·1 answer
  • Let A and B be regular languages. Is the set of strings of odd length from A beginning with 0 concatenated with the set of strin
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!