1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
2 years ago
10

If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?

Computers and Technology
1 answer:
nata0808 [166]2 years ago
4 0

Answer:

50*8/2

The asterisk is the multiplication sign and the parenthesis is the division.

I've never used an apostrophe for a multiplication sign before, but I'm guessing multiplication is what it stands for.

Explanation:

You might be interested in
After Maya gave her friend the password to a protected website, the friend was able to remember it only long enough to type it i
EleoNora [17]

Answer:

The correct answer is Short Term Memory.

Explanation:

The A and D options, Procedural and Implicit memory are two of the long-term memory types and the question states that Maya forgot the password after typing it in, so these options are incorrect. Option C, Flashbulb Memory is a type of memory which stores specific moments and events in a person's lifetime which are remembered like snapshots. So the correct answer is B, Short Term Memory. I hope this answer helps.

5 0
3 years ago
Which of the following describes a BYOD?
Law Incorporation [45]

Answer:

A policy allowing or encouraging employees, contractors, and others to connect their own computers, smartphones, and other devices to their organization's networks.

Explanation:

BYOD - Bring Your Own Device

6 0
3 years ago
An if statement must always begin with the word “if.” True False python
MrMuchimi

Answer:

true

Explanation:

6 0
3 years ago
Read 2 more answers
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
Discuss the economical challenges in software reuse using suitable examples.
Liula [17]

Answer: Reusing software device has some economical challenges such as:

  • Investment cost in reusing the device is considered as the extra cost.It  might require some extra components for the working to become usable
  • Requires skilled person who can develop and design the software to be used again.The creating and designing of new software design is comparatively easy but making the system reusable requires someone who has more designing skill who will be highly paid for the work
  • Cost of writing and reading of the software can also be considered as the economical challenge as the reused system created is to be studied by some other organization members or sources not familiar with the functioning. .

4 0
3 years ago
Other questions:
  • According to the article in WikiAnswers, digital communication systems have more benefits than analog systems. They are faster a
    10·2 answers
  • I want to know all part of computer system?
    9·2 answers
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • Gmod how to make someone admin on a lan server
    6·2 answers
  • Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate
    11·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
    7·1 answer
  • Who is tim berners-lee
    14·2 answers
  • Why is the computer uses binary why not trinary?​
    11·1 answer
  • Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST<br> pins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!