1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
4 years ago
5

Why do clocks tick-toc?

Computers and Technology
2 answers:
kondor19780726 [428]4 years ago
7 0
The gears and mechanism's sudden movements make the noises
finlep [7]4 years ago
5 0
In those, the pendulum has a mechanism which allows the hands to move forward by one gear every time it swings back and forth (google "escapement gear" if you want to know what this looks like). Hence, the 'tick' sound is when the pendulum swings one way and the 'tock' is when it swings back.
You might be interested in
Jennifer has written a short story for children. What should be her last step before she submits the story for publication? A) p
erik [133]
It would be a or c when she is writing a childerns story
5 0
4 years ago
Read 2 more answers
Pixel Data
pashok25 [27]

Answer:

-The correct width and height must be input into the pixelation widget to produce the image.

- The fact that only 32 bits were used to represent the image indicates relatively large sample squares were used. The digital image may vary from the analog image significantly.

Explanation:

8 0
4 years ago
Suppose a book author can be identified by an AuthorID and each book can be identified by an ISBN. Besides the identifier, an au
Scrat [10]

Answer:

a) We know that atleast one or more author writes a book.

Symbol to indicate one or more is (B)

So the correct option is B

b) We know that zero to multiple books are written by any author.

Symbol to indicate zero or more is (A)

So the correct option is A

c) The fourth option is correct if we replace by many to many relationship and generate a new entity.

So the relationship betweem author and contract is one to many. So we know that there is atleast one author that represent in symbol d and books has atleast 0 that represent in symbol c.

So Fourth Option is correct d at blue side and c at red side.

d) There are two forirgn keys in table Contract one is from AuthorId and other is ISBN.

So correcct option is C

6 0
3 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
3 years ago
Read 2 more answers
Which of the following is a common feature of GUI's?
AnnyKZ [126]
I believe the correct answer is C. A pointing device. 
6 0
3 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • 1. What is the difference between a learner’s license and an operator’s license?
    10·1 answer
  • John was teaching his students about the basics of computer hardware and software. By the end of his lecture, he asked his class
    5·2 answers
  • Describe Ms word environment.​
    14·1 answer
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Why are default parameters useful? *This is JavaScript*
    7·1 answer
  • List three features of the third generation of computers
    13·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!