Evaluate:
(3.7 x 10-2) (1.2 x 103)​

Answers

Answer 1

Answer:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]

Explanation:

Given

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Required

Evaluate

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Remove bracket

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 * 10^{-2}*1.2 * 10^3[/tex]

Rewrite as:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 *1.2* 10^{-2} * 10^3[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2} * 10^3[/tex]

Apply law of indices

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2+3}[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^1[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]


Related Questions

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Define the followimg terms as it relates to coding.

Expression

Variable

Assignment operator​

Answers

Answer and Explanation:

In coding, an expression is used to represent values. It may contain variables and/or constant.

Examples of expressions are:

[tex]a - b[/tex]     [tex]a * 2[/tex]     [tex]4 - 3[/tex]

Variables are literally memory locations. They are used to storing values, and they assume the values they store during program execution.

At any point in the program, the value of the variable can be changed.

Lastly, there are guidelines that follow naming variables (depending on the programming language).

Examples of accepted variable names (in C++) are:

num, num_1, num1

Assignment operator

This is the = sign. It is used for assigning values to variables.

Examples of how it is used are:

[tex]num1 = a - b[/tex]

[tex]num\_1 = a*2[/tex]

[tex]num = 4 - 3[/tex]

The following is a wrong usage of the operator

[tex]4 - 3 = num[/tex]

A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.


Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

DISPLAY(numFreezing/numDays)

}

B.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

C.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp < 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

D.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

numDays ← numDays + 1

}

}

DISPLAY(numFreezing/numDays)

Answers

Answer:

B.

Explanation:

The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.

numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

Please please help me
3. Which of the following are the tips for safe internet browsing?

Customize your security settings.
Turn on Two-Factor Authentication whenever possible.
Bookmark important sites.
O All of the above

Answers

Answer:

increase your browser security settings

The tips for safe internet browsing is to customize your security settings. The correct option is A.

What is internet browsing?

Browsing means searching or exploring the internet. Nowadays, people search on the internet for getting information about something. It needs a computer or an electronic device in which there is access to the internet.

Internet is a wireless connection of various computers together. There are different types of internet connections, like Wi-Fi, hotspot, wire internet, etc. It is used in various things like studying, watching movies, etc. which is necessary for this current time.

Safe internet browsing means being safe from internet crimes, like cyber crimes and saving the computer from viruses, and saving your data on the computer. Do not open unknown sites and emails.

Thus, the correct option is A. Customize your security settings.

To learn more about internet browsing, refer to the link:

https://brainly.com/question/9909761

#SPJ5

Learning Task 1 Write YES if the statement is correct and NO if it is incorrect.

1. Fruit orchards include any facility focused on growing cashew,almond and cacao.

2. Seed orchards focus primarily on growing trees that produceseeds rather than nuts or fruit.

3. Orchard is a piece of land where herbs are maintained for commercial production

4. Cashew, almond and cacao are plants found in the fruit orchard.

5. Papaya and mango orchards are example of Fruit Orchard.​

(ayusin nyo naman po malapit na po yung pasahan namin

Answers

Answer:

1) YES

2) YES

3) YES

4) NO

5) YES

In the Learning Task given above, the response are:

YESYESYES NO YES

What is Orchard?

An orchard is known to be a kind of plantation that is made up of trees or shrubs done or kept for food production.

Note that Fruit orchards include any facility focused on growing cashew, almond and cacao.

Learn more about orchards  from

https://brainly.com/question/11642092

#SPJ2

Please help!! I dont need the answer i just need explaining on how to do this!!!!

Answers

Explanation:

There are only two inputs to the circuit, and one output. There is an internal signal, not an input, between the inverter and the AND gate.

Here, it is convenient to label the top input A, the inverter output B, and the bottom input C. Of course, the output is labeled D.

Then B is the logical inverse of A, and D is the AND of B and C.

_____

Check for you

D will only be 1 for A=0 and C=1. It will be 0 otherwise.

After migrating the company’s entire datacenter infrastructure to a private IaaS solution, while at the same time maintaining the current network and server logical configuration, the IT director eliminated 50% of the IT engineering staff. The remaining staff has now shifted focus from a daily server maintenance and upkeep role, to more of a service provisioning, performance, and reporting role. Which of the following was MOST impacted by this migration?
A. Service design
B. Service strategy
C. Service operation
D. Service transition

Answers

Answer: C. Service operation

Explanation:

Based on the information given in the question, the service operation will be mostly impacted by the migration.

Service operation simply means the day-to-day activities, and processes which are responsible for the delivery of value through technology to the business.

Since the the company’s entire datacenter infrastructure has been migrated to a private IaaS solution, this will affect the service operation.

list any three positive impacts of computer technology in our society?

Answers

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

What is the primary function of RAM?


What is the basic unit of measurement for RAM specs?


A computer with sufficient RAM will be able to

with greater ease.


What can you do if a computer is running slowly and you suspect it is because you have insufficient

RAM?


How many bits are in one computer byte?





those questions have a drop-down box.

Answers

Answer :

1 . Stores Information temporarily

2 . byte

3 . switch between applications

4 . upgrade the RAM

5 . 8

JUST DID IT (Edge 2021)

Scientists have put genes into potato plants to make vaccines against cholera and hepatitis B.This type of research is called

Answers

Answer:

Edible vaccines

Explanation:

In the recent years, biotechnologist have developed a new concept known as the edible vaccines. The Edible vaccines are a subunit vaccines. Here the selected genes are first introduced into the plants and then the transgenic plant is induced to make the encoded protein. Foods like potato, corn, banana, soybean, lettuce, legumes and rice are used for these applications.

These edible vaccines can reduce diseases like the cholera, Hepatitis-B, diarrhea and other disease.

list five function key
list two alphabet key
byEmmanuel okorie​

Answers

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

2) The CPU is made from a silicon
b) Chip
C) pendrive
a) Steel

Answers

Answer:

b

Explanation:

a cpu is made from silicon chip

You are calculating commissions for sales staff at work. Employees receive ten dollars for every item sold. Your boss also wants to know the grand total paid to all employees as commission. How would you set this up in an Excel workbook and would you use absolute references, relative references, or both?

Answers

Answer:

To find the grand total paid to all employees as commission, we note the following;

The amount received by employees as commission for each item sold, r = $10.00

The information the boss wants to know = The grand total paid to all employees as commission

Let 'n' represent the the total sales, we have;

The grand total commission = Total sales × Commission

1) On MS Excel, four columns are created, labelled, Serial number, Employee Name, Number of Items Sold, Commission

2) In the second row, in the cell under the Commission column heading, Input the formula '=(Cell reference of adjacent Number of Items Sold) × 10' in the cell

3) Copy the the above formula to all the cells in the Commission column by clicking on the cell containing the formula, moving the mouse to the bottom right corner of the cell, and when the mouse pointer changes to a cross sign, left click and hold and drag to all the cells in the column

4) Input the formula =SUM(Argument) in the blank cell below the created Commission list

Where;

Argument = The reference to the range of cells containing the values in the Commission column

5) The output of the =SUM formula is the grand total paid to employees as commission

Explanation:

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

Which of the following best explains how symmetric encryption are typically used?

Answers

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

The option that best  explains how symmetric encryption are typically used is; A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Understanding Symmetric Encryption

Symmetric encryption is one of the oldest and best-known technique which makes use of secret key that could be a number, a word, or just a string of random letters, applied to the text of a message in order to change the content in a particular way.

Symmetric encryption involves the use of a key, which is known as the Symmetric Key which contains a series of numbers and letters.

Finally, Symmetric Key is used to encrypt a message as well as the same key is also used to decrypt it.

Looking at the given options from online, the correct option is A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Read more about symmetric encryption at; https://brainly.com/question/20262508

You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network. You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network. Which tasks should you complete as a part of this milestone? (Select two.) Correct Answer:

Answers

Answer: • Physically secure high-value systems

• Identify and document each user on the network

Explanation:

To develop a manageable network plan, the milestones include:

• prepare to document

• mapping network,

• protect your network

• network accessibility

• user access etc...

When identifying ways to protect the network, the tasks that should be completed are:

•®Physically secure high-value systems

• Identify and document each user on the network

Other Questions
A number that has both a whole number and a fraction is called a(n) O A) improper fraction OB) mixed number OC) whole fraction OD) combined number How did indulgences lead to conflict amongst the churches Please anwser correct. Which expression is equivalent to StartAbsoluteValue 8 EndAbsoluteValue + StartAbsoluteValue Negative 7 EndAbsoluteValue? Help me with this problem !!!!!!!!!! How are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat answer this one for me thanks ppppp I HAVE 5 MINUTES LEFT ON THIS TEST PLEASE HELPMr. Marcum is a research chemist who is testing a sample to determine its properties. He moved the sample from one container to another.sample kept the same volume, but its shape changed. From the behavior of the sample, Mr. Marcum knows that the particles that make upsample touch each other but are free to slide by each other. What is the state of this sample?OA gasOB.liquidC. plasmaD. Solid Factor the following expression.12x2 + 22x + 8 A jeweler had a fixed amount of gold to make bracelets and necklaces. Theamount of gold in each bracelet is 6 grams and the amount of gold in eachnecklace is 16 grams. The jeweler used 178 grams of gold and made 7 morenecklaces than bracelets. Write a system of equations that could be used todetermine the number of bracelets made and the number of necklaces made.Define the variables that you use to write the system. magbigay ng tatlong makabagong makinarya na ginagamit sa mabilis na ma proseso ang isang hilaw na material? if each square on the grid represents 400mi square how many miles will jacob's family travel? 5.Stephanie and Ryan go together to a local video store. Stephanie rents two movies and threegames for a total cost of $24.30. Ryan rents three movies and one game for a total cost of$18.25. How much does it cost to rent one movie? How much does it cost to rent one game? Show your work Can someone help me? Will mark brainlest! formula of (x+1)cube Which literary devices constitute the essential qualities found in every piece of fiction? A: Literary elements and literary techniquesB: Literary elements C: Literary devices D: All of the above Discover the rate of change (slope) of these two points. (-4,5) and (5,-4). Ryan took a hike on sunday. he hiked uphill for 15 minutes. then he hiked another River for 12 minutes. he hiked downhill for 8 minutes along a river for 5 minutes. how many seconds did Ryan hike on Sunday? plz help Type the correct answer in each box. Use numerals instead of words.Consider function h. Find a polynomial function of degree 7 with -2 as a zero of multiplicity 3, 0 as a zero of multiplicity3 , and 2 as a zero of multiplicity 1.