1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
2 years ago
8

3. Round off to the nearest hundredth (2 decimal places).

Computers and Technology
1 answer:
blagie [28]2 years ago
3 0
<h3>#a</h3>

\boxed{ \mathfrak{3.752 = 3.75}}

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:

<h3>#b</h3>

\boxed{ \mathfrak{0.506 = 0.51}}

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:

<h3>#c</h3>

\boxed{ \mathfrak{3.966 = 3.97}}

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:

<h3>#d</h3>

\boxed{ \mathfrak{1.838 = 1.84}}

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:

<h3>#e</h3>

\boxed{ \mathfrak{30.063 = 30.7}}

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:

<h3>#f</h3>

\boxed{ \mathfrak{404.759 = 404.76}}

You might be interested in
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
Plagiarism occurs when writers
pentagon [3]

Answer:

<h3><em>A</em>- Use others' ideas and writing as their own</h3>

Explaniation:

it's plagiarism, just don't take other people's work and pass it as your own. smh lol

3 0
4 years ago
Read 2 more answers
Identify actions to take when establishing a business. Check all of the boxes that apply.
Gekata [30.6K]

Plan for the unexpected

write a solid business plan

Keep lines of communication open

Predict how business is progressing

4 0
3 years ago
Read 2 more answers
When a user modifies the fonts in a message and immediately sees the effect of a font change without actually
MaRussiya [10]

Answer:

Font view

Explanation:

4 0
3 years ago
Read 2 more answers
Your reputation and credibility will be immediately destroyed if your website contains?
lora16 [44]

Answer:

B

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Combination keys perform a function when held down in combination with another key. true or false
    9·1 answer
  • The length, height, and width of a cube are 10, 7, and 5 cm respectively. Write a program that calculates the volume, perimeter,
    9·1 answer
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • Task 1 (25 points): In database [your Pitt username], create the following entity tables: movies actors locations Each tables lo
    7·1 answer
  • how can you turn on a light switch and it not work, without turning off the power to the whole house?
    15·1 answer
  • Which components are involved with input? Output? Processing? Storage?
    15·2 answers
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Suppose you are developing a cricket game in which you are asked to enter score of every ball and can score maximum 6 on each ba
    15·1 answer
  • Which of the following can be used to help find the error
    8·1 answer
  • Crisp-DM is an open standard process model that contains stages
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!