Answer:
A. Amplifies radio waves
Explanation:
e2021
Answer:
its A on ED
Explanation:
WILL GIVE BRAINLIEST!!!!!!
New space suits are being designed for future trips to the moon.
True
False
Answer:
True
Explanation:
Today, NASA unveiled its designs for future spacesuits that astronauts will wear during trips to the lunar surface.
Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, right, left again center, right, center, right center, right, left, center again
Answer:
left, center, right, left again.
Explanation:
Generally, in accordance with the highway traffic laws and regulations, it is important and necessary that when entering an intersection even with a green traffic light signal, all drivers should check left, center, right, then left again so as to do a confirmation that there isn't any danger from oncoming vehicles or anyone else. If this is strictly adhered to by road users such as drivers, there would be a great reduction in the number of road crashes or accidents.
In a nutshell, before entering an intersection, the safest searching process is to search left, center, right, then left again.
Safety is very important. Before entering an intersection, the safest searching process is to search Left, Center, Right, and Left.
There is a safe process to take when entering an intersection. When you have obeyed or yield to the sign facing you on the Intersection , you must then slow down and maybe stop if possible to let the other vehicles or pedestrians cross first and later on you drive ahead.
An intersection is also know as at-grade junction. This is simply the junction where two or more roads converge, diverge or meet and they are often at the same height. Looking Left, Center, Right, and Left is important before crossing an intersection.
Learn more about Road intersection from
https://brainly.com/question/24945907
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.
This road sign means
O road work ahead
vehicle breakdown
O service stations
O construction zone has ended
Answer:
A
Explanation:
Uh, yeah, I sure hope it does (to everyone who watched vine)
Which is the correct expansion of the term Internet?
Answer:
international network is the answer
Answer:
http (hypertext transfer protocol)
Explanation:
its an application tool for distributed, collaborative, and hypermedia informations system and foundation of data for world wide web. HTTP is used to fetch and transmit the web page.
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
Tenim tres resistors en sèrie, calcula la tensió que hi haurà a cadascuna d'elles sabent que una d'elles és de 680 Ω i les altres són de 220 Ω. El generador té una tensió de 12V.
Resposta:
Per a càrrega de 680Ω: 7,27 volts
Per a les dues càrregues de 220Ω: 2,36 volts cadascuna
Explicació:
Segons la llei d’ohms
E = IRt
E és la força electromotriu = 12V
I és el corrent total que circula al circuit
Rt és la resistència equivalent total
Com que els 680Ω, 220Ω i 220Ω estan en sèrie;
Rt = 680 + 220 + 220
Rt = 1120Ω
Obteniu el corrent total del circuit:
Recordem que: E = IRt
I = E / Rt
I = 12/1120
I = 0,0107A
Tingueu en compte que el mateix corrent flueix a través de resistències connectades en sèrie, però tensions diferents.
Obteniu les tensions individuals;
Per a càrrega de 680Ω;
V = IR
V = 0,0107 * 680
V = 7,27 Volts
Per a la càrrega de 220Ω
V = IR
V = 220 (0,0107)
V = 2,36 volts
Per tant, les tensions de les dues càrregues de 220Ω seran de 2,36 volts cadascuna
How many passes will it take to find the five in this list?
1, 5, 10, 15, 20, 22, 30
3
1
4
2
Answer:
1 im prety sure
Explanation:
Answer:
2
Explanation:
is the correct answer
good luck
Wires,plugs,speakers, chis are all examples of what
Answer:
Ch1kenT3nders
Explanation:
For which discipline is it most important to study computer technical support and networking?
Answer:
Studying computer technical support would contribute most to the disciplines of computer engineering and information technology.
have an amazing day! =)))
What is the average rate of change of h(x)=2^{x+1}h(x)=2 x+1 h, (, x, ), equals, 2, start superscript, x, plus, 1, end superscript over the interval [2,4][2,4]open bracket, 2, comma, 4, close bracket?
Answer:
Average Rate = 12
Explanation:
Given
h(x) = 2^(x + 1)
Interval = [2,4]
Required
Determine the average rate of change
The average rate of change of h(x) is calculated using.
Average Rate = (h(b) - h(a))/(b - a)
Where
[a,b] = [2,4]
Meaning a = 2 and b = 4
So, the formula becomes:
Average Rate = (h(4) - h(2))/(4 - 2)
Average Rate = (h(4) - h(2))/2
Average Rate = ½(h(4) - h(2))
Calculating h(4)
h(4) = 2^(4+1)
h(4) = 2⁵
h(4) = 32
Calculating h(2)
h(2) = 2^(2+1)
h(2) = 2³
h(2) = 8
So, we have:
Average Rate = ½(h(4) - h(2))
Average Rate = ½(32 - 8)
Average Rate = ½ * 24
Average Rate = 12
Hence, the average rate of change is 12
Describe the scope of the variables in this code.
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
class petCarrier:
size = 'medium'
color = 'red'
The scope of petName ______.
The scope of color is ______.
Accessible to the entire program
limited to the petCarrier class
limited to the pet class
(both of the blanks need one of those answers)
The scope of petName is local to the class pet.
The scope of color is accessible by all parts of the program.
How to interpret programming variables?The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.
The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.
Read more about programming variables at; https://brainly.com/question/9238988
#SPJ2
Answer:
The scope of petName limited to the pet class
The scope of color is accessible to the entire program
Explanation:
edge
HELP PLEASEEEE!!!!!!!
Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables people to collaborate without the extra cost of paying a service provider; however, there is an increased opportunity for cybercrime. Lack of regulation speeds up the process of invention, but requires individuals to back up their own data. Lack of regulation encourages open innovation, but is not always secure. Lack of regulation encourages greater collaboration, but can lead to increased cost from price increases.
Answer:
3.) Lack of regulation encourages open innovation, but is not always secure.
Explanation:
Got it right in Introduction to Careers in Arts, A/V Technology and Communications
What does the following loop do?
val = 0
total = 0
while (val < 10):
val = val + 1
total = total + val
print(total)
Prints the numbers backwards from 10 to 1.
Prints the sum of the numbers from 1 to 10.
Finds the average of the numbers between 1 and 10.
Prints the numbers from 1 to 10.
Answer:
Prints the sum of the numbers from 1 to 10.
Explanation:
YOU NEED BETTER INDENTATION
Total is the sum.
Each loop it's added
:)
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.
Answer:
the gps and a map
Explanation:
Answer:
I think. it could be GPS and maps to but I may be wrong so yeah
1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow
Which type of storage disk and disk drive can you use in the given situation?
Amy wants to borrow an interesting movie from Bruce so that she can watch it in her leisure time. Amy can hand over a (BLANK) to Bruce to copy 900 MB file. Bruce needs to have a (BLANK) drive to record data on the used DVD.
BLANK 1
CD
hard disk
DVD
BLANK 2
DVD-RR
DVD-recordable
DVD-RW
I : DVD
II:DVD-R
A DVD-RW would work too.
The types of storage disk drives that can use in the given situation are as follows:
Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD. What do you mean by Storage disk?Storage disk may be defined as a type of hardware device that can be used to store and save digital data and applications which may be in the form of images, video, audio, etc. For example, CDs, DVDs, hard disks, pen drives, etc.
Hard disks generally store a large quantity of data like 120GB to 30.72 TB. But here the data required to be stored is only 900 Mb, so DVD is the most accurate choice for this storage. It stores 500Mb of data to 8.5 Gb. A single-layer HD-DVD stores up to 15GB of storage capacity.
Therefore, Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.
To learn more about Storage Disk, refer to the link:
https://brainly.com/question/14762201
#SPJ2
ten(10) examples of wearables or wearable technologies?
Answer:read
Explanation:
airpods
headphones
earbuds
AirPods pro
watch
fitbit (type of watch that counts your miles) &you can say workout watch&
VR set
technology bracelet
smart glasses
Smart ring
List any ten keyboard symbols.
Answer:
Esc- Esc (escape) key.
F1 - F12 What are the F1 through F12 keys?
F13 - F24 Information about the F13 through F24 keyboard keys.
Tab Tab key.
Caps lock- Caps lock key.
Shift- Shift key.
Ctrl - Control key.
Fn- Function key.
Alt- Alternate key (PC only; Mac users have an Option key).
Spacebar- Spacebar key.
Hope this helps, have a great day/night, and stay safe!
what is a feature only used in powerpoint
I think powerpoint is the only presentation maker in which you can use 3D objects
Answer:
Slide transitions
Explanation: cause i got right
i'm sure 100%
Images, symbols, and diagrams are types of
art objects
Graphs
graphics
presentation objects
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is :
Graphics
Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.
While other options are not correct because:
Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.
Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT
Answer:
C. The energy used to create and maintain technology
#Carry on learning po
You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random
Answer:
from math import dist
Explanation:
The dist() method is a part of the math module. So, to include it you have to use the following line of code:
from math import dist
hope this helped :D
The line which will allows you to enter the following code in IDLE is from math import dist.
What is dist() method?The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.
The dist() method is a part of the mathematics module. Then, for
>>>dist([2.5).(5.9))
5.0 ,
we have to use code in IDLE as;
from math import dist
Thus, the line which will allows you to enter the following code in IDLE is from math import dist.
Learn more about dist() method.
https://brainly.com/question/25373810
#SPJ2
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
Write the steps to open file and folder
Answer:
1. Launch the File Open dialog. In the File menu, select the Open menu item.
2. Open the folder containing the desired file.
Select the desired file within the folder.
3. (Optional) Specify a file format type.
4. (Optional) Specify the character encoding.
5. Click on the Open button.
Tell me everything that happened in the fortnight galactics event. WHO EVER HAS THE BEST EXPLANATION WILL GET BONUS POINTS AND WILL BE MARK BRAINLYNESS
Answer:
people still play fortnight?!?!
Explanation:
psn: Smallboy_life
In full verbatim, a person wants to say that they admitted him to a hospital last month. He makes a mistake about the date and quickly corrects himself. How should a correct sentence look like?
Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.