If the mine winch drum diameter is 6M, how far will the counterweight lift for each single rotation of the drum
Answer:
Circumference of drum = 18.86 m
Given:
Diameter of drum = 6 m
Radius of drum = 3 m
Find:
Circumference of drum
Computation:
Circumference of drum is called single rotation
Circumference of drum = 2πr
Circumference of drum = 2[22/7][3]
Circumference of drum = 18.857
Circumference of drum = 18.86 m
True or false A job analysis weight the positives and negative of a given career
the answer to the given question is true in my opinion.
A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could use at least one type of input and one output to create a physical computing device to help this friend.
Answer:
We can add a water temperature guage with an alarm to show off that the tank is hot or cold
Explanation:
Answer:
Simple:
Explanation:
We could add a temperature sensor connected to the water, and a heater / cooler connected to the sensor, we created a program that checks the temperature from the sensor, making sure that when the water is hotter than recommended, we turn on the refrigerator, and when it is cooler, we turn on the heater
Which of the following statements is true regarding ARPANET? Select 3 options. It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers. It was a product of Bell Laboratories and was introduced to the general public in 1966. It was managed by three large corporations throughout its existence.
Answer:
1. It led to the development of the Internet.
2. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.
3. It was created to connect geographically dispersed researchers with high powered research computers.
Explanation:
ARPANET which stands for Advanced Research Projects Agency Network, was originally a form of network designed to provide wide-area packet-switching network combined with functions of control distribution through execution of the TCP/IP protocol suite.
Consequently, it led to the specialized establishment and creation of internet. Also, during its execution the first message sent through ARPANET was in 1969 and it was later decommissioned in 1990. The idea behind ARPANET creation was to connect geographically dispersed researchers with high powered research computer.
Answer:
b. It led to the development of the Internet.
c. It was created to connect geographically dispersed researchers with high powered research computers.
d. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.
What should Tuan do in the following scenario? Tuan wants to add a guest account to his computer for his little brother, but when he goes to the System and Security folder, he can not find the right option.
A) Go to Choose Homegroup and Sharing Options.
B) Go to Ease of Access.
C) Go to Appearance and Personalization.
D) Go to User Accounts and Family Safety.
Answer:
Tuan should do D.
Explanation:
As in if you use the mac, or any other computer, you would find the accounts in User Accounts and Family Safety or something like that. Go there, authenciate/unlock the computer, and press the + button or enable the guest. That is how you do it.
Before you could train as a physician, you first had to become _____.
Answer:
a scribe
Explanation:
Answer:
before you could train as a physician you have to be a Scribe
Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
add a title to a chart
change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart
Answer:
add a title to a chart
change the way a chart looks
change the type of an existing chart
Explanation:
In Microsoft Excel, a chart tool design tab is used to design and customize the look, feel and properties of charts in order to meet the taste of a user. Charts are used generally to visually or graphically represent the data in an excel worksheet.
The tasks which can be completed using the Chart Tools Design tab are;
1. Add a title to a chart.
2. Change the way a chart looks.
3. Change the type of an existing chart.
The tasks which can be completed using the Chart Tools Design tab are:
Add a title to a chart Change the way a chart looks Change the type of an existing chart
Based on the knowledge of computer spreadsheets, there are various tasks which can be used to complete the Chart Tools Design tab.
These tasks includes:
Add a title to a chart Change the way a chart looks Change the type of an existing chartRead more about design tab here:
https://brainly.com/question/10053553
Ok this a computer question I downloaded a beta intel graphics driver and i am also installing ark editor from epic games but now something is taking up my disk drive its saying on task manager the disk is 100% also i had a driver on before that does anyone know the problem? is the ark editor or me installing the new driver on top of the other the problem?
Answer:
Uninstall the driver.
Explanation:
I would go to your File Explorer, This PC or My Computer, right click, and go up to manage. It would open up a Computer Management window. You would need to find Device Manager on the left. You would then see alot of devices. Find where it says, Display adapters, click on the little arrow to the left of it. If you see the driver, right click on it, and click uninstall. This also depends on what operating system you're using, and note, you've installed a beta driver, not a tested, fully working driver.
Answer:
Uninstalling the driver will not resolve
Explanation:
This is not a driver problem, it is a disk problem, when you run ark, it starts to use a lot of memory, processor and DISCO, with that the disk gets overloaded leaving the system slower, uninstalling the driver can solve it momentarily, but it could cause more problems in the future, the best way for you to solve it is by buying an SSD and asking a technician to clone the HD to the SSD, the cheapest SSDs cost about $ 30
Which communication device uses wireless data transmission? Select 4 options.
Answer:
Satellite Internet providers, Smart Speakers, Smartphones and Bluetooth headphones are all wireless data transmissions.
Explanation:
The transmission device that uses wireless data transmission are the smartphones, Bluetooth headphones, satellite internet providers and the smart speakers.
What is wireless data transmission?Wireless data transmission is the transfer of digital or analogue signals using radio spectrum through the atmosphere. It doesn't involve wire or cables.
The examples of devices that makes use of wireless data transmission include the following:
Smartphones, Bluetooth headphones, satellite internet providers and smart speakers.A typical example of a device that makes use of cable is the Ethernet. An Ethernet connection transmits data over cable.
Learn more about data transmission here:
https://brainly.com/question/24373056
#SPJ2
which action taken by a teacher best illustrates a benefit digital learning
Cooperative learning, behaviour management, inquiry based instructions
Besides scrolling manually page by page in, say, Print Layout, identify at least two ways to move to specific locations or objects in a document.
Answer:
1. We can use the search bar 2. We can use the page number 3. Page Thumbnails
Explanation:
1. We can use the search bar
We type the word we are looking for into the search bar and the application then brings up a locations of the word in the document. We then click on the particular location of the word in the document.
2. We can use the page number
We type in the page number in the page number box to go to the particular page the item is found. When we type in the page we want to go to into the page number box and click enter, the application then goes to that particular page in the document.
3. Page Thumbnails
We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.
in a Print Layout, the two ways one can move to specific locations or objects in a document includes using of search bar or Page Thumbnails.
The two ways one can move to specific locations or objects in a document includes:
Using the search bar: We can type the word we are looking for in the search bar and the application then brings up the locations of the word in the documentUsing the Page Thumbnails: We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.Read more about Object location
brainly.com/question/12287298
Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was introduced to the general public in 1966. It was managed by three large corporations throughout its existence. It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers.
Answer:
2. It was created to connect geographically dispersed researchers with high powered research computers.
3. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.
5. It led to the development of the Internet.
Explanation:
The ARPANET has been able to led the development of internet with the first message been sent in 1969 and decommissioned in 1990, as well it connect geographically dispersed research. Thus, statements C, D and E are correct.
What is an ARPANET?ARPANET has been the first public packet-switched United States based computer network system. ARPANET stands for Advanced Research Projects Agency Network and was first used in 1969.
The statements that describe ARPANET includes:
It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers.Thus, statements C, D and E are correct.
Learn more about ARPANET, here:
https://brainly.com/question/3346870
#SPJ5
You are choosing your password for an online retailer. Pick the
strongest password:
Abcdefg
NEWS159737
ThisisMyPassword
12345678
Answer:
NEWS159737
Explanation:
This password uses a combination of letters and numbers, which generally makes the password harder to crack. However, some password cracking software may have been written utilizing the ideals that people will try to use a password with letters, numbers, and symbols, which can actually make it easier to hack a password like 1gh234g1kflc34 than a password such as pass1234.
All of the following are examples of what rigorous coursework in high school might mean except: A) added reading assignments. B) taking twice as many classes as normal. C) faster pace in covering course material. D) increased numbers of quizzes and tests. Can some one please help me Thank u
Answer:b
Explanation:
The correct option is:
B. taking twice as many classes as normal.
Rigorous coursework in high school typically refers to challenging and demanding academic programs that provide students with in-depth knowledge and critical thinking skills.
While options may vary between schools, rigorous coursework usually includes features such as increased numbers of quizzes and tests, added reading assignments, and a faster pace in covering course material.
However, taking twice as many classes as normal does not necessarily indicate rigor but rather an increased workload.
Rigorous coursework focuses more on the depth and quality of learning rather than the quantity of classes taken.
Learn more about Rigorous coursework click;
https://brainly.com/question/1062173
#SPJ2
Need Help
Redundant Paths
Describe two different paths that a message could take from Person A to Person D.
Answer:
The possible paths that a message can take from Person A to Person D are;
1) From Person A through Person B, then from Person B to Person D
2) From Person A through Person E, then from Person E through Person C and from Person E to Person D
Explanation:
In information technology networking, network redundancy is the process of message communication through the use of a network communication infrastructure, that includes extra or multiple network communication pathways and devices such that the inter-connectivity of the network is ensured in the event of a device failure.
The possible paths that a message can take from Person A to Person D are:
1. Part 1- From Person A through Person B, then from Person B to Person D
2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D
For better understanding let's explain this redundant path in this context means
The good description of redundancy is that it is the act of designing a network that can use multiple paths between switches to make sure that there is no single point of failure.From our answer above we can see that there are different path one can take to get to Person D. This shows that redundancy is in place and when an issue occur, there different ways to tackle it or get through to itRedundant path often referred to as Network redundancy is a copied (creating alternatives) infrastructure where more copies or instances of network devices and connections are installed to ensure an alternate path on the advent of failure.From the above we can therefore say that the answer The possible paths that a message can take from Person A to Person D are:
1. Part 1- From Person A through Person B, then from Person B to Person D
2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D, is correct
Learn more about redundant path from:
https://brainly.com/question/17880618
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?
Answer:
C
Explanation:
An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15
The term "bit" means binary digit, and it is used to represent data in a computer system. 4 bits can hold the sum of 14 and 15 because 4-bit is not large enough to represent 29 (an overflow will occur)
The maximum size of data an n-bit computer can hold is [tex]2^n[/tex]
So, a 4-bit computer can hold a maximum of:
[tex]Max = 2^4[/tex]
[tex]Max = 16[/tex]
i.e a maximum of 16 digits
In binary, the digits are 0000 to 1111 i.e. from 0 to 15
So, when 14 and 15 are added, the result is:
[tex]14 + 15 = 29[/tex]
The result is 29.
29 in binary is 11101
11101 is out of the range of the 4-bit binary sequence
Hence, an overflow will occur because 4-bit is not large enough to hold the sum
Read more about binary digits at:
https://brainly.com/question/9480337
All of the following are good reasons to attend a cummunity college except
What is the typical educational requirement for a non-entry level software programmer? high school diploma technical certificate bachelor’s degree master’s degree
Answer: technical certificate
Explanation: i just took the test and i got it right
A bachelor's degree in computer science, information technology, or computer engineering is usually required for a career as a computer programmer. Option C is correct.
What education do you need to be a non-entry level software programmer?Computer programmers create computer programs by creating code in a variety of programming languages. They run new programs through their paces and look for flaws. A bachelor's degree is often required for computer programmers, however some firms may recruit programmers with an associate degree.
Individuals who want to work as computer programmers must have a degree in computer science, information technology, mathematics, or a related field.
A bachelor's degree in computer and information technology or a related discipline, such as mathematics, is often required for computer programmers. Some firms, however, hire people with different degrees or experience in specialized programming languages.
Therefore, option C is correct.
Learn more about the bachelor’s degree, refer to:
https://brainly.com/question/5709442
#SPJ2
Need Help!
Which of the following activities may be legal but are unethical? Check all of the boxes that apply.
A) Cookies deposited by websites collect information about your browsing habits.
B) A law enforcement officer asks you to eavesdrop on a friend’s phone conversations.
C) A computer browser records your browsing history.
D) You download copyrighted movies and games.
Answer:
A and C are the only legal but unethical options
Answer:
A,B,C
A. Cookies deposited by websites collect information about your browsing habits
B. A law enforcement officer asks you to eavesdrop on a friends phone conversations
C. A computer browswer records your browser records your browsing history
Explanation:
edge 2021
The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and ______________. Group of answer choices
Answer:
Disable.
Explanation:
The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and Disable. The aforementioned labels associated with the driver tab of a Windows device are basically the tools which can be used to perform specific functions or tasks on a particular device driver, as well as generate information about them.
For instance, Uninstall button is an action which involves the process of completely removing a particular device driver in Windows.
If you change an item that is not public domain, is the design now yours? Why?
Answer:
YES, the design of the change item that is not public domain will be mine because I modified it.
Explanation:
Yes , In a situation where I change the item that are NOT public domain the design of the change item will be mine reason been that I am the one that the change the item or modified it .
Therefore PUBLIC DOMAIN can simply be defined as the domain in which every individual or the general public have the right to use without any form of restriction reason been that their is NO any form of property law or restriction law governing them .
This form of restriction law include the following TRADEMARK, COPYRIGHT AND PATENTS LAW.
Therefore despite the public domain is for public use NO individual can own the PUBLIC DOMAIN.
Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the footer and places her insertion point where the page numbers should go. Then, she navigates to the Header and Footer command group in the Design view.
Use the drop-down menus to explain how Angelina should complete this process.
What is her next step?
What should she do next?
What should she do last?
Answer:
Click Page Number, Click Current Position, Click Plain Number 1.
Explanation:
Just did it, e2020
Answer:
Click Page Number, Click Current Position, Click Plain Number 1.
Explanation:
just took it
1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in:
Answer:
Centrifugation.
Explanation:
When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in centrifugation.
Centrifugation can be defined as the process of separating particles from a liquid solution according to density, shape, size, viscosity through the use of a centrifugal force. In order to separate these particles, the particles are poured into a liquid and placed in a centrifuge tube. A centrifuge is an electronic device used for the separation of particles in liquid through the application of centrifugal force. Once the centrifuge tube is mounted on the rotor of the centrifuge, it is spun rapidly at a specific speed thereby separating the solution; denser particles are forced to the bottom (by moving outward in the radial direction) and the lighter particles stay at the top as a result of their low density.
What is a Hard Drive
Answer:
A hard drive is the built-in storage in computers. They have a high-capacity.
Let me know if you have any other questions regarding this topic.
What happens if you give false information on your driver license application?
Answer:
Cancelled
Explanation:
Providing false information on your driver license application will result in your license being cancelled.
Giving the DMV any false info is considered a crime.
Hope this helped!
Wireless data networks are particularly susceptible to known ciphertext attacks.
A. True
B. False
Answer:
The answer is TRUE
Explanation:
Wireless data networks uses wireless connections to send information to end users. Information here, are shared within a far distance. Mobile cell phones use wireless networks. Wireless network can be targeted from a distance and are therefore susceptible to attacks among which are ciphertext attacks.
Ciphertext are necessary way of coding a data to prevent readability which in turn would ensure the protection of the data. However, an attacker could attack wireless data networks using ciphertext attacks by decrypting any ciphertext through the knowledge of the secret key or encrypted key and through a handful of some encrypted messages.
Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose three.)
A. Office documents
B. Contacts
C. Operating system files
D. Email
E. Configuration settings
F. Apps
Answer:
email ur answer plllllllllllll mark me brainlest.......... .........………....….The fundamental problem in client-based networks is that all data on the server must travel to the client for processing.
a. True
b. False
Which statements describe the features of OneDrive? Check all that apply.
Answer: a,c,e
Explanation:
Answer: a c e
Explanation:
How can the various templates that are available for new Word documents be accessed?
a.) opening up an instance of Word
b.) pressing CTRL+N with Word open
c.) clicking File to enter Backstage View
d.) all of the above
Answer:
d
Explanation:
Answer:
d - all of the above
Explanation: