If a student ate 3/4 (three-fourths) of their meals away from home, what % of the total day is spent eating other than at home?

Answers

Answer 1

Answer:

Its 6%

Explanation:

8% = 0.08

3/4 = .75

(0.08) (.75) = 0.06 Or 6%

Hope It Helps ••


Related Questions

How do you make an organizational chart in PowerPoint?

Answers

On the Insert tab, in the Illustrations group, click SmartArt. In the Choose a SmartArt Graphic gallery, click Hierarchy, click an organization chart layout (such as Organization Chart), and then click OK

what is one example of the use of an infrared sensor?

Answers

Infrared sensors are used in motion detection, night vision, astronomy, art restoration, gas detection, and a variety of other applications.

Explanation:

Televisions, for example, use an infrared detector to interpret the signals sent from a remote control. Passive Infrared sensors are used for motion detection systems, and LDR sensors are used for outdoor lighting systems.

If x has a value of 7 and y has a value of 20, what is displayed as a result of executing the code segment

Answers

6.65 is displayed as the output of the block of code

In python programming, * denotes multiplication. To get the output, we will substitute the value of x and y given into the result to have;

result = x * y - x / (y)

result = 7 * 20 - 7 / (20)

result = 140 - 7 / (20)

result = 133/20

result = 6.65

This shows that 6.65 is displayed as the output of the block of code

The question is incomplete;

Let the code segment be

>>> x = 7

>>> y = 20  

>>> result = x * y - x / (y)

>>> result  

output:__?

Learn more here: https://brainly.com/question/24240957

Answer:

Three

Explanation:

The If the statement would be skipped as it does not agree with (x > 10). So if you solve the bottom else statement the display would be three.

Wendell keeps getting posts from Milo, a kid that he used to be friends with. Milo posts throughout the day, usually about sports that Wendell has no interest in. He does not mind interactions with Milo in person, but Wendell is sick of his feed being full of these posts. He wants to unfriend this Milo, but he thinks that would be rude. What advice would you give Wendell?

A.
Wendell should not unfriend Milo because they know each other.

B.
Wendell should just ignore the posts because Milo is not trying to be annoying.

C.
Wendell can unfriend anyone for any reason and does not need to explain.

D.
Wendell should explain to Milo that his posts are really boring.

Answers

I think A but this one is just confusing-

will my alarm go off if my phone is on do not disturb

Answers

yes,because the do not disturb is like for messages if you don’t want notifications from messages and apps.

How do computers hold integers greater than 255?​

Answers

Answer:

It depends on the number of bits you use. In your example, you've used an 8 bit (one byte) number, which does max out at 255. Ever since forever, computers have used numbers that are larger than one byte. For when that isn't enough, Fortran includes the 'double precision' numbers which use 8 bytes.

Explanation:

You add a style sheet link between which opening and closing tags?

Answers

<link> tag

The <link> tag is most often used to link to external style sheets. The <link> element is an empty element, it contains attributes only.

What are the different types of computer operating systems?

Answers

Answer:Apple iOS. Apple's iOS is a popular operating system for smartphones. ...

Microsoft Windows. ...

Apple MAC OS. ...

Linux Operating System. ...

Real-Time Operating System. ...

Normal Operating System.

Explanation:

echnician A says that UHSS is designed to absorb collision energy.

Technician B says that mild steel is designed to transfer collision energy.

Who is right?


A only

B only

Both A and B

Neither A nor B

Answers

Isbsbakajs Alana a sa

_____ have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Answers

Digital natives have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Digital natives simply refer to the people who have grown up under the influence of the internet and other information technologies.

A digital native refers to someone that's raised in a digital world. Such a person is in close contact with the internet, video games consoles, computers, etc. The term is usually associated with millennials.

In conclusion, the correct option is digital natives.

Read related link on:

https://brainly.com/question/25393713

Typing your password at a website's login screen and then receiving a code via text message that you must then enter at a second screen is an example of

Answers

Tfa- Tow Factor authentication

Typing the password at the website login screen and the receiving of the code via text message at the second screen represent the two-factor authentication.

The following information should be considered:

It is an extra security for the online accounts. By entering the username and password, the code should also be received to the linked mobile number so that the access could be done to the account.

Learn more: brainly.com/question/17429689

To insert slides from a Word outline, click the arrow below the _______ button and select the Slides from Outline option.

Answers

The computer consist of a lot of functions that are used in carrying out task. To put slides from a Word outline, click the arrow below the New Slide  and select the Slides from Outline option.

A slide is known as the single page of a presentation. A group of slides is commonly called a slide deck.

In this digital age, a slide is known as any single page created using a presentation program

To put slides from a Word outline,  first of all, you open PowerPoint, and select Home . Then you click on New Slide, click on Select Slides from Outline. In the put Outline dialog box, find and select your Word outline.

Learn more from

https://brainly.com/question/12060856

Which of the following should be considered when implementing a DMZ?

A DMZ can only monitor a web server.
A DMZ has no power after a network has been penetrated.
A DMZ can be used to monitor only internal traffic.
A DMZ can only monitor one computer at a time.

Answers

A DMZ (de-militarized zone) is a segmented network that discriminates between an organization's internal infrastructure and its externally connected units, such as the Internet.

If decided to implement a DMZ, certain conditions must be considered including:

Type of servers placed in the zone, i.e. web or email servers;

The strategical structuring and layout of the network, considering that it must include properly placed firewalls and other security hardware;

The degree of external user access required to both the interior network and the surrounding area of the DMZ;

Security policies and practices adopted to manage and vigilantly observe the DMZ;

The necessity for redundant provisions and failover ways to guarantee the continuous operation of sizable systems within the region of the DMZ.

Contrary to popular belief, a DMZ does not simply oversee one single computer or even just a web server.

Furthermore, DMZs are not unavoidably exempt from assaults, but they can prove to guarantee pivotal optimality and provide added layers of security to protect essential devices and data.

Read more about DMZ here:

https://brainly.com/question/23318736

#SPJ1

PLEASE I NEED HELP 100 POINTS for digital design and this was the only thing close
If you would like your text to have an italic effect, but increase the slant, which control would you use?

Answers

Answer:

press the Ctrl + I keys on your keyboard

______ is a type of specialized expansion bus used to connect audio and video equipment to the computer.

Answers

answer: firewire

explanation: it is used to connect audio to computers and other electronic devices like video equitment

All of the following are functions of the DBMS except ________. A) processing the database B) getting the users to use the database C) creating the database D) modifying the database E) providing tools to administer the database

Answers

Answer:

upendra SINGH hemant you

All of the following are functions of the DBMS except getting the users to use the database , Option B is correct.

The function of a Database Management System (DBMS) is to manage and control access to a database.

It provides various tools and functionalities to handle the storage, organization, retrieval, and manipulation of data within the database. However, the function of getting users to use the database is not directly performed by the DBMS.

While the DBMS enables users to interact with the database and perform operations on it, it is not responsible for actively encouraging or persuading users to utilize the database.

The DBMS focuses on providing the infrastructure and capabilities for efficient data management rather than actively promoting its usage.

To learn more on DBMS click:

https://brainly.com/question/14004953

#SPJ6

Topic: Video Games.


What game is the song "Lost in Thoughts all Alone" from? I will give you a hint: It's a JRPG.


Please...No links or gibberish.

Answers

Answer:

Fire Emblem

Explanation:

Yo, Quick question in the movie Into The Woods 2014 version. What character would you want to be in the movie. Give me a good reason too

Answer fast its due 11/17/2021 10:00PM

Answers

Answer:

Explanation:

Stephen Sondheim’s “Into the Woods” has been one of my favorite musicals ever since I saw it as a school play during my grade school days. Since then I have avidly watched and re-watched the 1991 Into the Woods starring Bernadette Peters, Joanna Gleason, Chip Zien, etc… It is an unusual combination of icons of the fairy tale world, starring Jack (from Jack and the Beanstalk), Cinderella, and bringing traditional figures from fairy tales like an evil witch, a quest for specific objects, a damsel in distress and of course Charming princes.  It pokes sly fun at the archetypal Prince Charming (memorably telling Cinderella, “I was raised to be charming, not sincere”) and the Wicked Witch (who is herself under a curse). Sondheim’s brilliant lyrics evoke a discussion about the relative morality in fairy tales and of course, a powerful look at parent-child relationships.

Into the Woods 2014

Hollywood has had a trend of turning famous musicals into movies, but one of the best was 2004’s Phantom of the Opera, starring unknown singers Emmy Rossum (Day After Tomorrow, Mystic River), Gerard Butler (300, Olympus has fallen) and Patrick Wilson (Watchmen, Insidious). Unfortunately, instead of taking a page from the success of Phantom, the newest version of Into the Woods yields to cinematic pressure (similarly to the 2012 Les Miserables debacle of casting Russell Crowe as Javert) by casting almost exclusively famous actors, possibly for their fame rather than their powerful voices. Starring Meryl Streep, Emily Blunt, Anna Kendrick, Johnny Depp and Chris Pine, many of the songs lose their vitality in this new version.  In particular, Johnny Depp’s weak rendition of “Hello Little Girl” (where he whispers words that are supposed to be sung outside of his range) and Chris Pine/Billy Magnussen’s “Agony” are disappointing though it is sung to brilliant comic effect for their overacting.  Additionally, the casting of James Corden as the Baker, the lead role, was unfortunate – though he can reach all the notes required, his voice lacks the strength to accurately portray the Baker’s desperation and newfound strength following the death of his wife.  I would have preferred a stronger singer as the leading man, though he does play the uncertain bumbling Baker quite well.

Advertisements

describe any three difficulties a company may face in running a business without having computer network

Answers

1- Loss of data, 2- more time will consume, 3- don’t know the lastra news, hope this helps

what html tag that you were required to use for images on abp3 provides accessable descriptions of the images to jaws?

Answers

The ALT tag is known to be one of the HTML attribute used in HTML and XHTML documents. The html tag that you were required to use for images on abp3 provides accessable descriptions of the images to jaws is called an ALT tag

ALT tag is often used to bring out or soecify an alternative text that is to be used when the element to which it is applied cannot be used.

It is also known as ALT attribute and ALT description.

As an HTML attribute, it is often applied to image tags to provide a text alternative for search engines.

Learn more from

https://brainly.com/question/9068937

Wasif would like to add some flair to text on a slide in his presentation. Which option can he use to create more dynamic graphics for his text?

*it's WordArt

Answers

Answer:

b. WordArt

Explanation:correct. post protected

1. What is a benefit of hosting software on a local network?

a. The concurrent license is less expensive than a single-use license.

b. Each computer has its own version of the software installed.

c. It is easier to use open source software.

d. The software can be managed and updated centrally.

Answers

Answer:

B

Explanation:

because each computer has its own version of the software installed for your make a own programming

A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly simplified form.

Answers

By definition, a neutral network is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly simplified form.

A neutral network processor is a CPU that takes the modeled operation of how a human brain works on a single chip.

Neutral network processors reduce the requirements for brain-like computational processing of entire computer networks that excel in complex applications such as artificial intelligence, machine learning, or computer vision down to a multi-core chip.

In other words, astificial neutral networks are a computational model that consists of a set of units, called artificial neurons, connected to each other to transmit signals. The input information traverses the neutral network (where it undergoes various operations) producing output values. Its name and structure are inspired by the human brain, mimicking the way biological neurons signal each other.

So the goal of the neutral network is to solve problems in the same way as the human brain, although neural networks are more abstract.

In summary, a neutral network is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly simplified form.

Learn more:

https://brainly.com/question/474553?referrer=searchResults

what is a hexadeciaml

Answers

Answer:

I think it's relating to or using a system of numerical notation that has 16 rather than 10 as it's base

Answer:

Hexadecimal is the name of the numbering system that is base 16.

Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she saved up to buy a new computer, and now she must come up with a password for it.
What is the best password for Sydney to use?

Answers

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

Answer: Its B or Second one

Explanation:

Correct  edge 2021

Explain the difference between physical robot and web-based robot. What is meant by autonomous control? Are robots really autonomous? What are the applications of robots in Agricultural sector?

Answers

Answer:

physical vs. web robot, autonomous control, ARE robots autonomous, agricultural robots

Explanation:

A physical and web robot are similar in their core, but the biggest differences is how they are programmed and what they do. A physical robot is either scripted to do something at a certain time, or are controlled by humans (such as unmanned sea vehicles, and rovers.) Web bots can do a VARIETY of things, everything from sorting numbers on a document to game development.

Autonomous control is no AI, but more just scripted learning. Like a Tesla using cruise mode, analyzing its surroundings and driving/correcting its path, or Siri learning what your name is by telling her.    

No robot in the world TRULY are self reliant, self sufficient, or self learning. Autonomous? No. Automated? Yes. Humans will most likely always have control over these things.

Robots are extremely important for large greenhouses an fields. It would take very long stretches of time to water them all by hand, so robots can tend to these plants without human interaction

switch to the view where you can see live data while modifying the report layout

Answers

To view the live or real data while modifying the layout of a report, the appropriate view to select is the Layout view.

Home tab --> View Group ---> click view --> Layout view

The Layout view allows modification of the page or document with the exact or real data as it is more visually oriented than the design view.

In the design view, the structure of the report can be modified or restructured without viewing the real data.

Hence, the appropriate view mode will be the a layout view.

Learn more : https://brainly.com/question/25651624

Any device used to provide the results of processing data is an

Answers

Answer:

output device

Explanation:

Have a nice day

PLease give brainliest

importance of primary key ?​

Answers

Answer:

Using the primary key, you can easily identify and find unique rows in the database table. They allow you to update/delete only specific records by uniquely identifying them. The table's data is sorted based on the primary key. They help you avoid inserting duplicate records in a table.

You have defined your player data type.class player:life = 3magic = Falsename = ''You created an instance of your player data type and assigned values.myPlayer = player()myPlayer.life = myPlayer.life - 1myPlayer.magic = TruemyPlayer.life = 4myPlayer.name = 'Kris'What will be the value displayed after this line of code?print(myPlayer.life)

Answers

Answer:4

Explanation:

Other Questions
The following sentence is incorrect. Find the the two negatives.Please dont feed none of the horses or sheep.A) dont, orB) dont, noneC) none, orD) none, of rewrite the power as a product of powers. (-3y)^4 Answer ASAP. :) Thank you! A Birmingham, Alabama, foundries produces cast-iron ingots according to a 3-month capacity plan. The cost of labor averages $100 per regular shift hour and $140 per overtime (O.T.) hour. Inventory carrying cost is thought to be $4 per labor-hour of inventory carried. There are 50 direct labor-hours of inventory left over from March. For the next 3 months demand and capacity (in labor-hours) are as Month Regular labor (hours) O.T. Labor (hours) Demand APR 2880 355 3000 MAY 2780 315 2750 JUN 2760 305 2950 Develop an aggregate plan for the 3-month period using the transportation method. a. What is the overall cost of this plan What is the simplified ratio of:8 weeks is to 12 days Which idea did Ptolemys model use to explain why the planets appeared to move backward as they moved in their orbits? A 1500-kg car accelerates from 0 to 25 m/s in 7.0 s. What is the average power delivered by the engine (1 hp how much did kirsten dunst get paid for spider man To consecrate means to:create something holy or perfectbecome unclean or unholyset apart as sacred or holyexalt a person over all others Identify FIVE ways the Mayans were seen as more advance than the Tainos and Kalinagos Python uses standard order of operations to evaluate equations. True False help solve please! (image) Look at the figure, which shows a newspaper headline from the late 1800s. A headline from the New York World newspaper with the headline "Dewey Smashes Spain's Fleet". The headline shows how newspapers used yellow journalism to sell more copies. Present facts. Express political opinions. Suggest political actions. pls help if ur good at math what would be a creative way to a do a pyramid in a small shoe box Yow can someone tell me what is ergonomic right now I'm confused? 100 points & brainliest! what punishment is Reynold given by king Baldwin the leper typical food-for-work programs improve local infrastructure like roads and irrigation systems. The benefits of such programs most often go to which group Which of the following statement is true about sanitizing.