The number represented by 20 hundreds blocks is 2,000. How many thousand
blocks represent the same number?

A 2000) b 20) c 2) d 1)

The Number Represented By 20 Hundreds Blocks Is 2,000. How Many Thousandblocks Represent The Same Number?A

Answers

Answer 1

Answer:

2

Explanation:

First, divide 2000 by 20.

For your answer, you will get 100.

For the question, it asks that we replace the 100 by 1000.

So, what we will do is 2,000 divided by 1000 and we will get 2.

Therefore, 2 will be our answer.

-kiniwih426


Related Questions

2) A ________ uses electronic memory and has no motors or moving parts. A) mechanical hard drive B) solid-state drive C) Blu-ray disc D) digital video disc

Answers

Answer:

A.mechanical hard

Explanation:

brainliest me and follow ty

2. 25 POINTS!!!!!!!!!
The essential idea behind digital citizenship is that _____.

A. we all have rights

B. we all impact each other

C. we must defend against attacks

D. we all have responsibilities

Answers

Answer:

d. we all have responsibilities.

Explanation:

The essential idea behind digital citizenship is that we all have responsibilities.

Why digital citizenship is an essential?

Digital citizenship is known to be a type of citizenship  where there is a responsible use of technology.

Hence, It is essential of digital citizenship to be taught as it helps students to attain and know more about digital literacy, digital responsibility, and others.

Learn more about citizenship from

https://brainly.com/question/11052165

Match all the words to its definitions

Please, no links, and answer all of the 7 words to its definition.

Answers

Answer:

Explanation:

from top to bottom

1

2

7

3

4

5

6

question. answer

1.1

2.2

3.7

4.3

5.4

6.5

7.6

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of

Answers

Since the client requested that her database application be moved to a separate network drive, this an example of: Local network hosted.

In Computers and Technology, cloud computing refers to a type of computing that requires the use of the following shared computing resources over the internet:

Network (web) servers.Computer power.Cloud storage (data storage).  Software programs (applications).

A hosted software can be defined as a software program (application) that is installed, hosted and accessed by end users (clients) entirely from a remote  location, network drive or server.

Read more: https://brainly.com/question/18369405

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

Answers

Employee monitoring software is sometimes used in smaller business networks, but it is impractical for use in large business networks due to numerous users and the potential for misuse by these users.

An employee refers to an individual who is employed in a business organization by an employer of labor, so that he or she can perform specific tasks, duties or functions within the business organization while being paid an agreed amount of money as wages.

On a related note, an employee monitoring software can be defined as a software application (program) that is designed and developed for the surveillance of a workplace, in order to gather information about the locations and activities of the employees working in a particular business organization.

However, employee monitoring software are ideal or better suited for smaller business networks, but it is impractical for use in large business networks due to higher number of users and the potential for misuse by these users.

Read more: https://brainly.com/question/23986526

What is a computer? (in your own words)

Answers

Electronic device used to do work or play on

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

True or false: Most Brainly users are saltier than the ocean. If false, explain why.

Answers

Explanation:

btw I'm not salty........

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

Answers

Bluetooth devices are widely used today. BlueBorne refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne is known to be an airborne attack vector that often makes use of Bluetooth to aid an attacker to breakthrough and take complete control over targeted devices.

The attack often do not need the targeted device to be paired to the attacker's device or even set to discoverable mode

Bluetooth devices are said to be not visible until they are manually set to discoverable mode.

Learn more from

https://brainly.com/question/13718919

What describes Accenture's approach to automation?

Answers

There are different ways that are often used to achieve a goal. Accenture's approach to automation is said to be human-centered.

Accenture's approach entails giving their client custom based service via the use of a cloud based system that helps their clients to focus on automatic system. This is known to result in better business operations.

Accenture's myWizard often helps their clients through their automation journey. They help by creating, implementing, and measure enterprise-wide automation strategies for their client.

See full question below

What describes Accenture's approach to automation?

1.cloud-centered

2.human-centered

3.intelligence-centered

4.machine-centered

Learn more from

https://brainly.com/question/24434735

File names should be limited to 144 characters.

true or false

Answers

Answer:

True.

Explanation:

For easier recalling of file names and quicker accessibility...

A cheerful teen willing to help,

who listens to "ROAR,"

stay salty...

true or false computers in a LAN are most likely to be connected using infra red

Answers

Answer: false

Explanation:

How do you tell if a text message offer is a scam?

Answers

Answer:

By the #

Explanation:

the web __________ the same thing as the internet.

Answers

it would be the world wide web:) hope this helps!

Which of the following is NOT an example of an Information system?
Electrical system
Transaction processing
Expert system
Customer relationship management

Answers

Answer:

Electrical system is not an example of an info system.

The following option which is NOT an example of an Information system is electrical system.

What is information system?

The system of hardware and software that are integrated to form a integrated system. This system allows information to transfer from one user end to another user.

Transaction processing, Expert system and Customer relationship management requires end to end encryption with information sharing. These are the information system except electrical system. The electrical system only supplies electricity to lighten up homes and industries.

Thus, Electrical system is not the information system.

Learn more about information system

https://brainly.com/question/13299592

#SPJ2

Martha pays $3,335 every month for her house payment. She has made 86 payments up till now. How much has Martha paid for her house in all so far?

Answers

Answer:

286810

Explanation:

86*3335=286810

Latonya wants to include a website link in her newsletter so readers can click the link and go straight to the website. What kind of formatting does she need to use

Answers

Based on the information given the kind of formatting she need to use is hyperlink.

Hyperlink is link that enables users or readers to go directly to another website or another webpage.

Hyperlink can be included in a website in form of  text or in form of a bookmark which help to lead  user to another page once the user click on the link.

This link can be included in a webpage or newsletter to serve as a reference for user and they are often  underlined or may include "click here".

Inconclusion  the kind of formatting she need to use is hyperlink.

Learn more about hyperlink here:https://brainly.com/question/3027709

The amount of memory used by an array depends upon the array's data type and the number of elements in the array. True False

Answers

Answer:

True

Explanation:

Anybody know the answer to this question?

Answers

Answer:

sorry i need pointssssss

which shortcut keys can be used to duplicate a slide?

Answers

Answer:

Ctrl + D used to duplicate a slide

100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

What connection method eliminates the need to provide a bank user name and password after the initial setup process

Answers

Based on the internet and networking process, the connection method that eliminates the need to provide a bank user name and password after the initial setup process is known as "OAuth."

This is because OAuth is a type of connection that allows users not to provide their bank username and password after initial setup.

OAuth is a common internet protocol known as an open standard for access delegation.

OAuth is utilized on web applications to allow users to log in without passwords.

Hence, in this case, it is concluded that the correct answer is "OAuth."

Learn more here: https://brainly.com/question/17079128

You have production infrastructure sitting behind one DNS domain, and for disaster recovery purposes, you have parallel infrastructure on standby behind a second domain hosted in a second AWS region. Which routing policy will automate the switchover in the event of a failure in the production system

Answers

Answer:

Failover

Explanation:

A failover is required when one set of infrastructure fails then traffic is redirected to the second set of backup infrastructure.

what is the advantage of 2022 maxima’s over-the-air software and map updates?

Answers

The benefit of 2022 maxima’s over-the-air software and map updates is that it keeps an individual to be connected on-the-go.

It should be noted that over-the-air software and map updates are typically performed automatically with minimal input from the driver through the available wireless network.

An advantage of 2022 maxima’s over-the-air software and map updates is that it keeps an individual to be connected on-the-go. It's essential to provide the driver with the ability to turn the vehicle into a powerful WiFi hotspot.

Read related link on:

https://brainly.com/question/25660340

Instructions
Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate
line.
Expected Output
3
6
9
12
15
18
21

Answers

Answer:

num = int(input('1'))

while num < 21:

   num = num * 3

   print(num)

i think this is correct, but i only know some basics to python.

A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Answers

Malware
Hope this helps

Answer:

Dictionary Attack

Explanation:

Which of the following statements regarding animation in a slide use is true?

Question 3 options:

Animations occur automatically by default


An object can have up to three stacked animatios.


A slide can only have one animation


Animations occur On Click by default

Answers

Answer:

Animations occur automatically by default

If the characters 'd', 'c', 'b', 'a' are placed in a queue (in that order), and then removed one at a time, in what order will they be removed?.

Answers

Answer:

a b c d

Explanation:

I'm just using the characters to reach the characters minimum

Please answer the following questions:

[1] What is cyberbullying? [5marks]

[2] What is plagiarism? [5marks]

[3] What do you understand by ergonomics? [5 marks]

[4] What is identity theft? [5 marks]

[5] Who is an excellent digital citizen? [5 marks]

Answers

1) Bully that takes place on technology/ social media
2) copying of work, is illegal
3) ergonomics is the study of people's efficiency in their working environment
I think it’s asking you what helps you learn
4) Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
5) my mom, she knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Answers

Answer:

analysis

Explanation:

The Discovery of user requirements, existing system evaluation, and logical system design are part of the analysis phase of the Systems Development Life Cycle (SDLC).

What is the System Development Life cycle?

The systems development life cycle (SDLC) is a project management conceptual model that defines the processes involved in an information system development project, from early feasibility studies to application maintenance. SDLC is applicable to both technical and non-technical systems.

The phase of the system development life cycle whose parts involve the discovery of user requirements, existing system evaluation, and logical system design is the Analysis phase.

Hence, the phase is the Analysis Phase.

Learn more about the System Development Life cycle here:

https://brainly.com/question/28498601

#SPJ2

Other Questions
The plasma membrane does all of these except. Please help me I dont understand this Jill has always wanted to travel to China and plans to take a trip there in five years; she estimates that she will need $3,000 to pay for the trip and plans to make annual deposits to a savings account to reach her goal for pay for the trip. If her account earns 2% interest, how much should she deposit each year to reach her goal Plz help me I have been stuck on this for soo long plzz! Well mark brainliest ONLY if u are correct! An agreement whereby an investment banker tries to sell securities of an issuing corporation, but assumes no risk if the flotation is unsuccessful is called a: Find the mistake : I helped someone with his homework. His name is Alec and he's a classmate of mine. Which best defines color?a physical property of matter related to a materials ability to reflect lighta physical property of matter related to how a material interacts with different wavelengths of lighta chemical property of matter related to a materials ability to reflect lighta chemical property of matter related to how a material interacts with different wavelengths of light Which of the following can be classified asinfectious agents? Select all that apply. If an astronaut was on a planet 9*10^10 meters away, how long would it take a radio signal (in seconds) to travel from them to Earth? (Be sure to give your answer to two decimal places) The temperature is 5C bellow zero. Which integer represents this temperature pls pls dont aswer for aswer I can get you account banded so be carefullWhat happened to the South's economy because of the Civil War? (2 points) aBecame based on mining bIncreased wealth for residents cWas ruined dGrew strongerQuestion 2 (2 points)(04.05 LC)Which describes the effects of the Civil War on Florida? (2 points) aFlorida had less physical damage so had to rebuild less. bFlorida had more physical damage so had to rebuild more. cFlorida had few resources to share. dFlorida continued to have slavery after the Civil War.Question 3 (2 points)(04.05 LC)Which type of institutions did African Americans establish after the Civil War that became an important part of community life? (2 points) aArtistic bJudicial cMedical dReligiousQuestion 4 (2 points)(04.05 LC)What was one effect of the Civil War on the South? (2 points) aThe plantation system became more successful. bThe economy in the South grew. cSome areas were destroyed by battles. dTowns and buildings were expanded.Question 5 (2 points)(04.05 LC)Why did former slaves have a difficult time finding work after the Civil War? (2 points) aBlack Codes prevented African Americans from getting certain jobs. bLandowners no longer needed their help. cThere were few opportunities in manufacturing. dAgriculture was not an important part of the economy.Question 6 (2 points)(04.05 LC)Who farmed the land in the sharecropping system? (2 points) aAfrican Americans and poor whites bLandowners cPlantation owners dSchool children and Native AmericansQuestion 7 (2 points)(04.05 LC)What ended with the end of the Civil War? (2 points) aChild labor bHunger strikes cPollution dSlaveryQuestion 8 (2 points)(04.05 LC)How did the economy in the South change after the Civil War? (2 points) aFocused on agriculture bFocused on manufacturing cIncluded both agriculture and manufacturing dContinued to rely on slaveryQuestion 9 (2 points)(04.05 LC)Why did federal troops occupy the South during Reconstruction? (2 points) aBlock supply of goods from the South bHelp them rebuild cMake sure they followed the law dTeach first aidQuestion 10 (2 points)(04.05 LC)How did Florida help other states during Reconstruction? (2 points) aBuilt tables bGrew oranges cMined gold dSent lumber How many ways can you arrange 2 letters from the word S Q U A R E The Israelites did NOT grumble against God at the red sea when it seemed that Pharoahs army would destroy them. True or False? what were the British motives in the French Indian war Explain how energy changes in the spring toy below when it goes downstairs Tech A says that some automotive lightbulbs have more than one filament inside. Tech B says that before aligning headlights, make sure the tires are inflated properly. Who is correct who in the Senate determines when a bill comes in front of the Senate for debate? pls help me answer this In President Washington's Farewell Address, he gave the Nation several bits of advice. According to our class notes, which of the following WAS NOT included in Washington's advice?Question 3 options:Avoid accumulating debtAvoid making alliances with foreign nationsBeware of the dangers of political partiesConsider returning to the Articles of Confederation If a painter paints 3 rooms in 1/2 day, what would be a reasonable estimate, how many rooms would painter paint in working 5 days? What is painters rate of painting in rooms painted per day? * Answer each of the questions using your personal experiences or make up a situation.1. How and why has someone vexed you? 2. How and why did you have the audacity to stand up for yourself? 3. Explain a task in which you resolved to do. 4. Explain a situation in which you witnessed someone show derision toward someone else. Explain how you would act cunningly to cheat on a test. 5. When would it be necessary to walk stealthily in a public place?