Answer:
Explanation:
The storage on a hard drive was very small in those days. The 5.25 floppy allowed data created by a program to be saved so that it could be used again later. In fact, it also allowed other uses to make copies of the data because networks were very much less sophisticated as well and so direct copying (station to station) wasn't always possible.
Computer has brought radical change in every field
Answer:
Yes it has brought change in every field
Explanation:
John is considering his STEM education choices. He wants to begin working in the technology field as soon as possible.
What level of degree should he pursue?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
STEM is a curriculum based on the idea of educating students in four specific disciplines — science, technology, engineering, and mathematics — in an interdisciplinary and applied approach. The students who graduated in STEM-based education getting more paid and jobs than students who did not study the STEM-based education.
As in this question that John is considering his STEM education choices, and he wants to begin working in the technology field as soon as possible. He should pursue bachelor (graduate) degree in technology. Because after, passing out, he can begin working in technology easily.
Answer:
Associate's degree
Explanation:
what dog breed is this
a chow chow
b Siberian husky
c Portuguese pondego
d toy poodle
click picture for example
Answer:
C i'm pretty sure
Explanation:
Hope i help
Windows and Linux command.
- Displays installed network interfaces and the current config settings for each
The "ifconfig" command can be used to show the current network configuration information, configure a network interface's hardware address, ip address, netmask, or broadcast address, create an alias for the network interface, and enable or deactivate network interfaces.
Use the ifconfig command to view or set up a network interface. The ifconfig command may be used to set or show the current network interface configuration information as well as to assign an address to a network interface. For each interface that exists on a system, the network address must be specified using the ifconfig command during system startup. The Windows system's network interfaces' fundamental IP addressing details are shown via the ipconfig command. The IP address and subnet mask are also included in this information. However, output that is more detailed might be helpful.
To learn more about "ifconfig" click the link below:
brainly.com/question/13097970
#SPJ4
a computing device small enough to hold in your hand
A handheld computing device is a portable electronic device that is small enough to be held in the hand and offers functionalities similar to a computer. Examples of handheld computing devices include smartphones, tablets, and handheld gaming consoles.
Handheld computing devices are portable electronic devices that are small enough to be held in the hand. These devices, such as smartphones, tablets, and handheld gaming consoles, provide functionalities similar to a computer.
Handheld computing devices are equipped with a touchscreen interface, allowing users to interact with the device using their fingers or a stylus. They are powered by batteries and can connect to the internet, enabling users to browse the web, access social media, send emails, and download applications.
In addition to internet connectivity, handheld computing devices also have built-in cameras, speakers, and microphones. This allows users to capture photos and videos, listen to music, and make voice or video calls.
Handheld computing devices support various applications and software, providing a wide range of functionalities. These include productivity tools, entertainment options such as gaming and multimedia playback, and communication features like messaging and video conferencing.
Overall, handheld computing devices have become an integral part of our daily lives, offering convenience, portability, and connectivity.
Learn more:About handheld computing devices here:
https://brainly.com/question/20842907
#SPJ11
The term that describes a computing device small enough to hold in your hand is a "handheld device."
A handheld device, also known as a hand-held device, is a portable device that can be held in one hand and used to perform a range of computing tasks. Handheld devices are popular because they are easy to transport and use while on the go, and they often have many features that make them ideal for specific applications such as gaming or communication. Some examples of handheld devices include smartphones, tablets, e-readers, and handheld gaming devices.
These devices are small enough to fit in a pocket or purse and can be used for a variety of tasks, including browsing the internet, sending and receiving messages, taking photos, playing games, and more. Handheld devices have become increasingly popular in recent years as more people have started using mobile devices to stay connected and productive while on the go.
Know more about handheld device:
https://brainly.com/question/29829788
#SPJ11
What security factors do companies need to consider when buying an operating system?
Answer:
What they can do to prevent malware and hacking.
Explanation:
They would want the ability to have high security including strong firewalls and a minimal amount of loopholes in the OS itself. A company can't always rely on a patch to come through and would instead need something guaranteed to be nearly perfectly secure. For this reason, some companies choose Linux or Unix.
I tried going into a website called Utters.io, but when I typed a phrase in, the video was taking a really long time to load. Does anyone know what's wrong with it?
Answer:
Your internet or browser
Explanation:
Try another browser or resetting your router. If a YT video will load then you can rule out internet speed and try another piece of client software.
Telecommunications, outsourcing, flextime, teamwork, and diversity are workplace trends adopted to
O True
O False
Answer:
False
Explanation:
Outsourcing and telecommuting are the trends related to presence of growing technology within the economy allowing various services to be outsourced to people who are more of an expert when it comes to handling those procedures.
Several key people were involved in programming-language development in the 1970s and 1980s.
Choose all that apply.
Bjarne Stroustrup released C++ programming language in the1980s.
John McCarthy developed LISP for artificial intelligence.
Bill Gates and Paul Allen released the first programming language for a personal computer.
Niklaus Wirth developed Pascal to teach programming.
Answer: 1,3,4
Explanation: These are correct answers
Several key people were involved in programming-language development in the 1970s and 1980s:
Bjarne Stroustrup released C++ programming language in the 1980s.
John McCarthy developed LISP for artificial intelligence.
Niklaus Wirth developed Pascal to teach programming.
Thus, options A, B and D are the correct options.
In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.
Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.
Thus, options A, B and D are the correct options.
Learn more about programming-language here:
https://brainly.com/question/32901513
#SPJ3
select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define and describe the strategy, give an example of its use, and explain why its effective.
(computer science-communication)
Answer:
Active listening is used to make things more clear when talking to other people. Whether it is on the phone or face to face active listening can reduce any unwanted barriers of communication. Getting rid of barriers can help a company save time rather than trying to explain things multiple times. This ultimately would lead to more goods or services being produced therefore making the company more efficient. There are many more reasons why this workplace tacit is useful but I personally believe this is one of the more used ways.
I really hope this works for you!
Which statements describe the use of style in word
Answer:
can be used to make Word documents look the same
saves the user time when doing formatting tasks
allows for the definition of reusable formatting
can be applied to paragraphs and fonts
go to the main structural styles section and do the following: a. change the background color of the browser window by creating a style rule for the html element that sets the background color to the value hsl(27, 72%, 72%). b. for the body element, create a style rule to set the text color to the value rgb(91, 91, 91), the background color to ivory, and body text to the font stack: verdana, geneva, sans-serif.
To change the background color of the browser window, you can create a style rule for the html element in the CSS file. In the style rule, set the background color property to the value hsl(27, 72%, 72%). This will change the background color of the entire browser window.
In the style rule, set the text color property to the value rgb(91, 91, 91). Set the background color property to ivory. Finally, set the font stack property to verdana, geneva, sans-serif.
By adding these style rules, the background color of the browser window will be changed to hsl(27, 72%, 72%), and the body text color will be set to rgb(91, 91, 91). The background color of the body element will be set to ivory, and the font stack for the body text will be verdana, geneva, sans-serif.
To know more about property visit:
https://brainly.com/question/29134417
#SPJ11
each row in the relational table is known as an ? a. entity set b. entity occurrence c. entity tuple d. entity relation
A table is a group of data organized in columns and rows. Tables in a relational database should be normalized, which means they should be designed to minimize data redundancy and prevent data inconsistency.
The primary key of a table is a special column that identifies each row in that table uniquely. Each table must have a primary key, and it must be unique for each row in the table.Each column in a table corresponds to an attribute. An attribute is a property of the entity represented by the table. For example, if the table represents customer information, the attributes can be customer name, address, email, phone number, etc. In a table, each row represents an entity tuple. An entity tuple is a unique set of attribute values for a specific entity instance. For example, if the table represents customers, each row in the table represents a unique customer. In addition to tables, relational databases use other structures such as indexes, views, and stored procedures. Views and stored procedures are pre-written SQL statements that allow database administrators and developers to customize the data they retrieve from tables. They can be used to limit the number of columns that are returned or to join tables together to generate complex queries.for more such question on relational
https://brainly.com/question/13262352
#SPJ11
True or False: To create a function in python, you start with the keyword "def"
Answers: True or False
Answer:
true i think
Explanation:
Answer:
true
Explanation:
i saw the other answer and wanted to contribute to your knowledge
You are a manager and one of your team member ask why using slide presentations are a good idea. What’s the best way to respond
Answer:
tell them that the slides help u organize the info easly
so that the peaple/audience will understad
Explanation:
Answer: Slide presentations are familiar to most audiences, and will help them focus on the content.
Explanation: Got it correct on the quiz.
A Class or ID can be declared in the opening or closing tag
psing tag
O True
O False
Answer
True.
Explanation:
In HTML, you can declare a class or ID for an element in the opening tag or closing tag of the element.
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message. When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message. both public keys Larry's public key Larry's private key Joshua's public key
Joshua may also use his own private key to sign the message to ensure its authenticity and integrity, but this is a separate process from encryption
Public key encryption, also known as asymmetric encryption, uses a pair of keys - a public key and a private key - to encrypt and decrypt messages. In this scenario, Larry's public key is used by Joshua to encrypt the message, which means that only Larry's private key can be used to decrypt and read the message.
It is important to note that Joshua should not have access to Larry's private key, as it is meant to be kept secret and secure. If Joshua wants to send an encrypted message to Larry, he should obtain Larry's public key from a trusted source, such as a public key directory, and use that key to encrypt the message.
.To know more about private key visit :-
https://brainly.com/question/29999097
#SPJ11
hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?
(a) lengthy and complex processes for making payments (b) legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition
(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.
(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.
(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.
To learn more about technology click here: brainly.com/question/9171028
#SPJ11
what does reporter failure mean on adt alarm system
On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.
How does the ADT alarm system function?ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.
ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.
Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.
Learn more about the ADT alarm system, refer to:
https://brainly.com/question/28199257
#SPJ5
In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.
ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.
When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:
Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.
Learn more about network on:
https://brainly.com/question/29350844
#SPJ6
Heather is running a training program to teach a few contractors how to use excel. All of the contractors are spread out around the country. Which of the following would be the best approach to conduct the training?
one-on-one phone calls
text messages
emails
one-on-one face-to-face meetings
webinars
Webinars offer a convenient, interactive, and cost-effective approach to training contractors located across the country. They provide a platform for real-time interaction, screen sharing, and collaborative learning.
To conduct the training program for the contractors spread out around the country, the best approach would be webinars. Webinars allow for interactive and real-time training sessions, providing an efficient and cost-effective way to reach a geographically dispersed audience. Here's a step-by-step explanation:
1. Webinars enable Heather to deliver the training program to all contractors simultaneously, regardless of their locations. This eliminates the need for travel and accommodation expenses.
2. Through webinars, Heather can share her screen and demonstrate Excel techniques, allowing contractors to see the practical application of the concepts being taught.
3. Contractors can actively participate in the training by asking questions, which Heather can answer in real-time. This fosters engagement and ensures that contractors understand the material.
4. Webinars often include features like chat boxes, where contractors can interact with each other, discuss challenges, and share insights. This creates a collaborative learning environment.
5. Recorded webinars can be made available for contractors to review later, allowing them to revisit specific topics or catch up if they missed the live session.
To know more about effective visit:
https://brainly.com/question/29429170
#SPJ11
which of the following is considered an out-of-band distribution method for private key encryption?
Copying the key to a USB drive is considered an out-of-band distribution method for private key encryption.
An out-of-band distribution method involves physically transferring the private key to a separate device, which can then be used to access the encrypted data. This method is often used in situations where the key needs to be kept offline for security reasons, such as in high-security environments or for storing backup copies of sensitive data.
In this case, copying the key to a USB drive and physically delivering it to the recipient is considered an out-of-band method, as it does not rely on digital communication channels like the other options.
The other options listed, using a key distribution algorithm, using a private fiber network, and sending a secured email, are all in-band distribution methods that rely on electronic communication channels to transmit the private key.
To know more about USB visit:
https://brainly.com/question/3522085
#SPJ11
Write a program that uses an initializer list to store the following set of numbers in a list named nums. Then, print the first and last element of the list.
56 25 -28 -5 11 -6
Sample Run
56
-6
List and Print Elements.
Here's a possible implementation of the program in Python:
python
Copy code
nums = [56, 25, -28, -5, 11, -6]
print("First element:", nums[0])
print("Last element:", nums[-1])
The output of the program would be:
sql
Copy code
First element: 56
Last element: -6
In this program, we first define a list named nums using an initializer list with the given set of numbers. Then, we use indexing to access the first and last elements of the list and print them to the console. Note that in Python, negative indices can be used to access elements from the end of the list, so nums[-1] refers to the last element of the list.
ChatGPT
__________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.
The data file that is used to identify individuals or organizations online and is comparable to a digital signature is known as a digital certificate. It is also referred to as an SSL (Secure Sockets Layer) certificate or TLS (Transport Layer Security) certificate.
Digital certificates are used in online communication to secure sensitive data such as credit card numbers, login credentials, and other personal information. They work by verifying the identity of the sender and the recipient of the data being transmitted. They also ensure that the data transmitted between the two parties is encrypted and cannot be intercepted or tampered with by unauthorized third parties.
There are different types of digital certificates, including domain validated certificates, organization validated certificates, and extended validation certificates. Domain validated certificates are the simplest type of digital certificate and are used to secure basic websites. Organizational validated certificates, on the other hand, are used to secure e-commerce websites and other websites that require a higher level of security. Extended validation certificates are the most secure type of digital certificate and are used by financial institutions and other organizations that require the highest level of security to protect their customers' sensitive information. In conclusion, digital certificates are essential for securing online communication and ensuring that sensitive information is protected from unauthorized access or tampering. They provide a secure and reliable way to verify the identity of online users and ensure the privacy and security of online transactions and communications.
To know about digital certificate visit:
https://brainly.com/question/29726262
#SPJ11
Based on the content of Lecture 4 , for this assignment, you will create a well-thought out Project Scope Statement. The Scenario: You have a close friend who is getting married on October 29, 2022. You are very excited because they asked you to be in their wedding party. However, when you look around at the other members you realize their organization and planning skills are definitely lacking. It looks like you are going to be planning the bachelorette or bachelor party for your good friend and you decide to put your project management skills to the test. Create a project scope statement for your friend's party, using all of the elements we discussed (project objective, scope, justification, deliverables, milestones, technical requirements, limits and exclusions and acceptance criteria). Have fun with this and be creative.
The project scope statement for planning a bachelorette or bachelor party for a friend's wedding includes the project objective, scope, justification, deliverables, milestones, technical requirements, limits and exclusions, and acceptance criteria. It aims to ensure a well-organized and enjoyable celebration that meets the expectations of the bride/groom and the wedding party while considering limitations and exclusions.
Project Objective: The objective of the project is to plan and execute a memorable and enjoyable bachelorette or bachelor party for the friend getting married on October 29, 2022.
Scope: The scope of the project includes the planning, coordination, and execution of activities related to the bachelorette or bachelor party, including venue selection, travel arrangements, event schedule, entertainment, and accommodations.
Justification: The party is important to celebrate the upcoming wedding and create lasting memories for the bride/groom and the wedding party. It aims to provide a fun and stress-free experience.
Deliverables: The deliverables include a detailed party itinerary, reservations and bookings, transportation arrangements, themed decorations, entertainment options, and any other elements necessary for a successful party.
Milestones: Key milestones include finalizing the party date, securing venue and accommodations, sending out invitations, arranging activities and entertainment, and ensuring all logistics are in place.
Technical Requirements: Technical requirements may include audio-visual equipment, lighting, music, and any other technical aspects needed for the event.
Limits and Exclusions: The project scope does not cover wedding planning or any pre-wedding events outside the bachelorette or bachelor party.
Acceptance Criteria: The success of the project will be measured by the satisfaction of the bride/groom and the wedding party, adherence to the planned itinerary, successful execution of activities, and overall enjoyment of the event.
Learn more about execution here: https://brainly.com/question/33118468
#SPJ11
Which statement is true about mobile devices and your personal information?
A Mobile devices are expensive and can be bought and sold in many locations.
B Mobile devices must be protected because they contain private information about the owner.
C Mobile devices cannot be lost or stolen so your information is secure in them.
D Mobile devices are safe for storing any important information because they can be locked with a password.
Answer:
B Mobile devices must be protected because they contain private information about the owner.
Explanation:
B is correct because people do need to keep their mobile device protected from people who want to take their information because a mobile can carry a lot of personal information about someone and if stolen, a person could potentially steal someone's identity. Answer A is not true because at some locations mobile devices can be very cheap. The answer is not C because mobile devices CAN be stolen because anyone could easily take your phone out of your hand and run away with it. The answer is not D because your phone could get a virus and in many cases the virus can easily steal all of your information with knowing or not knowing your password because it might be downloaded already into you device.
Which two configuration steps are required before quick actions can be used in macros?
The two configuration steps are required before quick actions can be used in macros are:
B . Quick Actions must be enabled in the org.
C . The specific quick action must be added to the case Feed.
What is Computer configuration?In regards to communications or the use of computer systems, a configuration of a system is known to be a term that connote a kind of an arrangement or setting of all of its functional units.
It is one that is known to be based to their nature, number as well as main chief characteristics.
Therefore, The two configuration steps are required before quick actions can be used in macros are:
B . Quick Actions must be enabled in the org.
C . The specific quick action must be added to the case Feed.
Learn more about configuration from
https://brainly.com/question/13484609
#SPJ1
October 6, 2021examsLeave a commentPost navigation
Which two configuration steps are required before quick actions can be used in Macros?
A . Global Actions needs on the publisher layout.
B . Quick Actions must be enabled in the org.
C . The specific quick action must be added to the case Feed.
D . The specific quick action must be added to the case record Type.
The Marx Brewing Company recently installed a new bottling machine. The machine's initial cost is $2,000, and can be depreciated on a straight-line basis to a zero salvage in 5 years. The machine's fixed cost per year is $1,800, and its variable cost is $0.50 per unit. The selling price per unit is $1.50. Marx's tax rate is 34%, and it uses a 10% discount rate. Calculate the accounting break-even point on the new machine, as well as the present value (Finance) break-even point on the new machine.
Accounting break-even point: 1,800 units.
Present value break-even point: 400 units.
To calculate the accounting break-even point on the new machine, we need to determine the number of units that need to be produced and sold in order to cover the fixed costs and variable costs.
The fixed costs per year are given as $1,800, and the variable cost per unit is $0.50. The selling price per unit is $1.50. Let's denote the break-even point as Q, the number of units that need to be produced and sold.
Accounting Break-Even Point:
Total Fixed Costs + (Variable Cost per Unit * Q) = Total Revenue
$1,800 + ($0.50 * Q) = $1.50 * Q
Simplifying the equation:
$1,800 + $0.50Q = $1.50Q
$1.50Q - $0.50Q = $1,800
$1.00Q = $1,800
Q = $1,800 / $1.00
Q = 1,800 units
Therefore, the accounting break-even point on the new machine is 1,800 units.
To calculate the present value break-even point on the new machine, we need to consider the time value of money by discounting the cash flows. The present value break-even point represents the number of units that need to be produced and sold to recover the initial cost of the machine in present value terms.
The present value break-even point can be calculated using the following formula:
Initial Cost = (Fixed Costs / (1 + Discount Rate))^t + (Variable Cost per Unit * Q) / (1 + Discount Rate)^t
Where t is the time period (in years) and Q is the break-even quantity.
In this case, the initial cost is $2,000, the fixed costs per year are $1,800, the variable cost per unit is $0.50, the discount rate is 10%, and we'll assume t = 5 (since the machine can be depreciated over 5 years).
Plugging in the values:
$2,000 = ($1,800 / (1 + 0.10))^5 + ($0.50 * Q) / (1 + 0.10)^5
Simplifying the equation and solving for Q:
$2,000 = $1,800 / (1.10)^5 + ($0.50 * Q) / (1.10)^5
$2,000 - $1,800 / (1.10)^5 = $0.50 * Q / (1.10)^5
$200 / (1.10)^5 = $0.50 * Q / (1.10)^5
$200 = $0.50 * Q
Q = $200 / $0.50
Q = 400 units
Therefore, the present value break-even point on the new machine is 400 units.
Learn more about break-even point here:-
https://brainly.com/question/29569873
#SPJ11
Out of 270 racers who started the marathon, 240 completed the race, 21 gave up, and 9 were disqualified. What percentage did not complete the marathon?
Approximately 11.11% of the racers did not complete the marathon.
To calculate the percentage of racers who did not complete the marathon, we need to find the total number of racers who did not finish the race. This includes both those who gave up and those who were disqualified.
Total number of racers who did not complete the marathon = Number who gave up + Number who were disqualified = 21 + 9 = 30.
Now, we can calculate the percentage using the following formula:
Percentage = (Number who did not complete / Total number of racers) * 100
Percentage = (30 / 270) * 100 = 11.11%.
Learn more about marathon here:
https://brainly.com/question/14845060
#SPJ11
What is a user data?
Answer: Any data the user creates or owns.
Explanation:
the user being the one on the otherside of the computer, usually a human.
but examples of user data are intalled programs, uploads, word documents created by user (computer user)
What are 3 inputs and outputs of an ipad?
Answer:
do u mean pros and cons?????
Explanation: