Jorge wanted to find out how many 9-volt batteries connected in a series are required to create a 120-volt circuit. So, he divided 120 by 9 and concluded that he needed 13 1/3. Write a sentence explaining Jorge's mistake, and tell the correct answer.

Answers

Answer 1

Answer:

Jorge needed to have over 13 (thirteen) 9 volt batteries to create 120 volts.

Explanation:

Rather than saying he just needs 13 1/3 (one-quarter) 9 volt batteries, Jorge would have correctly concluded he needed over over 13 number of 9 volts battery to create 120 volts.

This is the case because in a series connection, two or more batteries are connected in a way that the same current would flow through each battery through their terminal. If he had taken note of the fact that each battery has an internal resistance, which may reduce the flow of current through the batteries Jorge would know that the  13 number of 9 volts batteries would not give exactly 120 volts because of the internal resistance of the battery circuit.


Related Questions

Which of the following are examples of interpreted languages? Each correct answer represents a complete solution. Choose two. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Markup B Compiled C Query D Scripted

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The given question has more than one question and some of the choices are missing so, their correct solution and the question with the choices can be defined as follows:

1)

Interpreted languages:

The interpreted language is a kind of programming language, in which most of the applications carrying out instruction freely and openly, without having compiled a program. so, the types of the programming language are " PHP, Perl, Ruby, and Python"

2)

The answer is "Post a glossary or FAQ page".

explanation:

This section is used to covers the data. It is used as the goal of the company or business to obtain answers to these questions. Those who may also use your FAQ page for a first contact point for clients who are searching for answers before contacting you directly.

please find the attachment.

A virus does not harm the ________ of a computer

Answers

Answer:

Hardware part

Explanation:

The hardware part of computer is not harmed by virus.

I hope this will be helpful for you

Answer: Hardware part

List any four routes of transmission of computer virus.
please give me answer​

Answers

Opening attachments or links from unknown or spoofed emails. note: shown above are two examples of how viruses can often appear as legitimate messages, but are designed to trick the computer user. ...

Downloading software from malicious sites. ...

Online Ads. ...

Social media. ...

Unpatched software.

follow me

The routes of the transmission of computer virus include:

Downloading infected files.Shared devices.Corrupt email attachments.Infected drives.

A computer virus refers to a malicious piece of computer code that is designed in order to damage a device or steal data.

The routes of infection for a computer virus include attached files, external storage media, downloading infected files, sharing infected devices, etc.

Read related link on:

https://brainly.com/question/19584310

You’ve just completed a survey of the wireless signals traversing the airspace in your employer’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
A. Rogue access point
B. War driving
C. Bluesnarfing
D. Hidden node

Answers

Answer:

A. Rogue access point

Explanation:

A rogue access point is a point that is wireless and installed on a network that is safe and secure without taking any permission from a local administrative network (LAN). It could be done by an employee or a person who is a malicious attacker

Therefore according to the given situation, since there is an unauthorized AP i.e too strong which is mid of 100-acre campus so it would be a threat of Rogue access point and the same is to be communicated to the boss

Which is an aspect of structural-level design? A. scaling B. player-adjusted time C. difficulty level D. radiosity

Answers

Answer:

D. radiosity

Explanation:

This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects light diffusely.

Answer:

its d

Explanation:

im right

What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network? Group of answer choices

Answers

Answer:

Network Access Control

Explanation:

A Network Access Control (NAC) system can deny network access to, quarantine, or restrict resources to a device before allowing the device access to a network.  This keeps insecure nodes from infecting the network.  For more information check out cisco's resources regarding NAC and it's uses and implementations.

What are the types of computers?

Answers

Answer:There are 5 types of computers.

Explanation:(1)Super computer: are the fastest and expensive computer.super computer can do trillion calculations in every second.

(2)Mainframe: are similar to the super computers all use raw power focus on few tasks.

(3)Server computer: is a central computer that contain of collection data and program.

(4)Personal computer: is also known as a microcomputer.personal computer is all around can  be used as productivity tool.

(5)Work station: are expensive computers and more complex and are intended one user at a time.

Answer:

the four types of computers are;

personal computerMainframe computersuper computersMini computers

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

What is the role of bpo in growth of Indian economy ?

Answers

Answer:

BPO Role in India's Economic Growth

The role played by BPOs in boosting India's economy shows that the IT and ITeS sector have been contributing largely to the economic growth of India. The growth in the contribution of BPOs to Gross Domestic Product has shown a steady rise from 1.2% to 5.4%.

__________ attribute specifies the height of the image.

Answers

Answer: The height attribute specifies the height of an image.

Explanation: Hope That Helps! (:

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software.
What type attack has infected Hector's computer?

Answers

Answer:

Rogue antivirus

Explanation:

A Rogue antivirus is a security software in which it misguides the users to pay for it so that the malware or virus could be removed from the computer but actually this is a malware which is installed in the computer system so that they could able to do fraud with the users

In the given situation, since Hector is trying for run Windows defender but it is disabled and on the other side the other antivirus software that infected the computer

Therefore this situation represents the rogue antivirus

You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to avoid having stale data. Because it is redundant. Because it should be defined in another class. In order to keep it current.

Answers

Answer:

The answer is "In order to avoid having stale data".

Explanation:

In this question, only the above-given choice is correct because follows the class-object concept, and the wrong choices can be defined as follows:

In this question, the second and third choices are wrong because its class field data value is not redundant, it should not define in another class.The third choice is also wrong because it can't define the class field to keep it current.  

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

Which statement about tensile stress is true? A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object. B. Forces that act perpendicular to the surface and squeeze an object exert a tensile stress on the object. C. Forces that act parallel to the surface exert a tensile stress on the object. D. Forces that decrease the length of the material exert a tensile stress on the object.

Answers

Answer:

The correct option is;

A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object

Explanation:

A material under tensile stress has axial forces tending to stretch the material and cause elongation. It is the force per unit area externally applied that results in stretching

The definition of tensile stress is the magnitude or amount of applied force on an elastic material divided by the cross-sectional area of the material perpendicular to the direction of the applied force

Therefore, the tensile stress comprises of forces that act perpendicular to a given surface pulling the sections apart.

WHAT ARE THE CONTENTS THAT WE SHOULD USE FOR THE PRESENTATION OF DIGITAL WORLD

Answers

Answer:

Introduction

Importance

Advantages

Disadvantages

Effects

Conclusion

What did early computers use to store each bit?

Answers

Answer:

A vacuum tube

A vacuum tube I believe

which is most harmful computer virus define​

Answers

Answer:

Spyware is the most harmful virus.

It enters into someones computer as a spy and steals the ones personal information, data and other codes.

Explanation:

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

While investigating a 4-year-old PC that is taking an unusually long time to boot, a technician discovers that the BIOS is rediscovering the hardware system at every boot. What should the technician do to resolve the problem

Answers

Answer:

learn and train it to make it boot faster

Explanation:

Well we know that the PC is old and it takes a long time to boot also the BIOS is rediscovering the hardware system at every boot so he should make it reboot and learn and train it to make it boot faster

Are bpos safe for organisations ? State your views on it

Answers

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.

Mental state shift involves what?

Answers

Answer:

It involves a matter involving doubt, uncertainty, or difficulty that may be solved, problem ... getting into a frame of mind to be creative and solve problems.

Explanation:

Hope i am marked as brainliest answer

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed.
​Andy wants the borders to be distinctly visible for each cell in the product details table. Which of the following properties must Andy add to his code to accomplish his goal?
A. ​border-spacing: length;
B. ​border-collapse: separate;
C. ​border-collapse: collapse;
D. ​border-spacing: initial;

Answers

Answer:

CSS documentation

Explanation:

Use this CSS reference to browse an alphabetical index of all the standard CSS properties, pseudo-classes, pseudo-elements, data types, and at-rules. You can also browse a list of all the CSS selectors organized by type and a list of key CSS concepts. Also included is a brief DOM-CSS / CSSOM reference.

Locatiopn: https://devdocs.io/css/

The properties that Andy must add to his code to accomplish his goal is (B), border-collapse: separate.

What is border-collapse?

The border-collapse property in CSS determines how the borders of table cells are collapsed. The default value of border-collapse is collapse, which means that the borders of adjacent cells are merged together. To make the borders of the cells in Andy's table distinctly visible, he needs to set the border-collapse property to separate.

The other possible answers are incorrect. The border-spacing property determines the amount of space between the borders of adjacent cells. The border-spacing: initial value sets the border spacing to the default value, which is 0 pixels.

Find out more on CSS properties here: https://brainly.com/question/14918146

#SPJ2

A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriving at the site, the technician detects a smoke smell coming from the computer. Which of the following is the BEST solution?
A. Power down the system and replace the CPU.
B. Power down the system and replace the power supply.
C. Install an additional case fan for proper ventilation.
D. Remove the side panel for proper ventilation.

Answers

Answer:

The answer is "Option B".

Explanation:

When the technician detects a smoke smell, which is coming from the computer system it means it will sort to solve this problem the technician will shut the system down and substitute electricity, at this, it overcomes the problem, and wrong choices can be defined as follows:

In choice A, It is wrong because in this system component may be destroyed.In choice C and D both are wrong because it is not a software and side panel problem.-

_____ should be scanned for viruses

Answers

Answer:

Computers/laptops should be scanned for viruses.

Your question has been heard loud and clear.

People's blood , the plasma in the people's blood should be scanned for viruses.

Thank you owo

i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont know what to do someone please help

Answers

Answer:

Type the password

Explanation:

It's probably trying to open some kind of compressed file to access data.

1. Write a try-catch block. In try block, do the following thing: if the balance is less than 100, throw an InsufficientFund exception; else print out the message saying that there are enough money in the account. In catch block, simply print out the message saying that there is not enough money in the account.
2. Write a template function template
T max(T& variable1, T& variable2)
That returns the larger value of variable1 and variable 2.
Assume that class T has overloaded the operator >.

Answers

Answer:

(Assuming C++):

#1

try{

 if (balance < 100)

 {

   throw "InsufficientFund";

 }

 else

 {

   printf("Sufficient funds in account.\n");

 }

}

catch{

 printf("Insufficient funds in account.\n");

}

---------------------------------------------------------------------------------------

#2

template <typename T>

T max (T& variable1, T& variable2)

{

 return variable1 >= variable2 ? variable1 : variable2;

}

Explanation:

For this, the answer assumes the use of the C++ language since not specified in the problem.

For #1, the use of the try-catch statement is simply to check the value of the funds within an account.  The question ask to check if the balance is under 100, to throw an "InsufficientFund" exception to be caught by the catch loop.  Otherwise, print there is enough funds.  If the exception is caught, the catch loop should simply print insufficient funds to the console.  The above code accomplishes each of these things by assuming a variable called "balance" holds the value of the account and has already been declared.  Additionally, the code uses the printf function to display the messages to the screen (Assuming stdio.h header has been included).

For #2, a template function called max was created to determine if variable1 or variable 2 had a greater value, and return the greatest variable.  The code uses the ternary operator to test the expression greater than or equal to and returns variable1 if greater or equal, otherwise, it returns variable2.

Side note, I haven't coded in C++ in years so some syntax may be wrong, but either way this is the concept of the two questions asked (I think I'm syntactically correct though).

Cheers.

The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: Student Success Site Media Center dashboard Guidance Center

Answers

I Inferred you are referring to the Georgia Virtual School resource program.

Answer:

Guidance Center

Explanation:

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

How does vibrancy affect a web page design? - Changes the emotion of the page - Decreases site traffic - Increases reading difficulty - Keeps color choices similar

Answers

Answer:

It changes the emotion of the page.

Other Questions
A man from a foreign country obtained a doctorate in political science from a state university and applied to teach there. The man was denied employment at the university under a state law requiring all teachers within the state to be United States citizens.Is the state's citizenship requirement constitutional as it applies to the man?A Yes, because states have the right to set minimal standards for state employees under the Tenth Amendment.B Yes, because a university political science teacher would exert a great deal of influence over the attitudes of students toward government, the political process, and citizenship.C No, because the citizenship requirement is not rationally related to a legitimate state interest.D No, because the citizenship requirement is not necessary to achieve a compelling state interest. If 35%discount is given on a trouser which costs #3,000.00k,how much will a buyer pay for the trouser? What are the trigonometric ratios? Write all six. Based on a poll, among adults who regret getting tattoos, 12% say that they were too young when they got their tattoos. Assume that ten adults who regret getting tattoos are randomly selected, and find the indicated probability. Required:a. Find the probability that the number of selected adults saying they were too young is 0 or 1.b. Find the probability that exactly one of the selected adults says that he or she was too young to get tattoos.c. Find the probability that none of the selected adults say that they were too young to get tattoos. Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running.Whats the role of oxygen in cellular respiration? A. It accepts electrons and keeps the electron transport chain running. B. It breaks down carbon-based sugar molecules to release energy and forms carbon dioxide. C. It combines with hydrogen ions in sugar molecules to release energy and form water. D. It supplies electrons to the electron transport chain to keep it running. A sample of 32 boxes of cereal has a sample standard deviation of 0.81 ounces. Construct a 95% confidence interval to estimate the true standard deviation of the filling process for the boxes of cereal.a. (0.656, 1.064) b. (0.520, 1.100) c. (0.430, 1.132) d. (0.729, 0.729) e None of the above (a) use the pythagorean theorem to determine the length of the unknown side of the triangle, (b) determine the perimeter of the triangle, and (c) determine the area of the triangle. the figure is not drawn to scale.the length of the unknown side is ____the perimeter of the triangle is ____the area of the triangle is ___ Scenario You have worked at your current employer for 5 years. Recently your company merged with a much larger Boston accounting firm to improve efficiencies, increase revenues, cut costs and adopt best practices in the industry. After the merger, you find yourself on a team with four other individuals that you have never met. Each individual is from a different department: auditing, tax, corporate governance, legal and insurance. The purpose of your team is to reduce the number of employees in your department. Why is the change needed? Match the items.The task is to match the lettered items with the correct numbered items. Appearing below is a list of lettered items. Following that is a list of numbered items. Each numbered item is followed by a drop-down. Select the letter in the drop down that best matches the numbered item with the lettered alternatives.a.Verbalb.Situationalc.Dramatic1.Jim bought combs for Della's hair, but she cut her hair.a2.The reader knows Della has cut her haira3.There are no examples of this irony in the story. Solve the equation. 2x + 4 = 3x 2 Sara needs to pack 108 stalks of roses, 81 stalks of lilies, and 54 stalks of orchids into identical baskets so that each type of flower is equally distributed among the baskets. Find the largest number of the basket that can be packed Select the correct answer. Whom did sharecropping most often harm? A. heads of railroad companies B. market vendors C. African American sharecroppers D. white landlords Which statements are true about these lines? Select three options.The slope of line MN is Two-thirds.The slope of line PQ is undefined.The slope of line RS is Negative three-halves.Lines RS and TV are parallel.Line RS is perpendicular to both line MN and line PQ If we know that apatite is the mineral that makes up the enamel of our teeth, what physical properties might you want to know about apatite when determining how to make a good toothpaste Write an equation of the line that satisfies the given conditions. Give the equation (a) in slope-intercept form and (b) in standard form.Through (-2,4): perpendicular to x=8(a) The equation of the line in slope-intercept form is_____. The planets how and block are near each other in the Dorgon system. the Dorgons have very advanced technology, and a Dorgon scientist wants to increase the pull of gravity between the two planets. Which proposals would the scientist make to accomplish this goal? check all that apply. i dont understand how to find Which ordered pair is a solution of the equation? y=8x+3 ______ 1. What law protects plant and animal species in danger of extinction? the U.S. Fish and Wildlife Service c. the species recovery plan the Endangered Species Act d. the captive breeding plan Explain what a directed line segment is and describe how you would find the coordinates of point P along a directed line segment AB that partitions AB so that the ratio of AP to PB is 3:1. 3^x = 27^a+b and a^2-b^2/(a-b)=5 What is x?