1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
4 years ago
7

Pix blocks półfinały skilled

Computers and Technology
1 answer:
jasenka [17]4 years ago
6 0

mam  ,,4 6 7 12 15 .18.20.

You might be interested in
Which of the following statements are valid in Java? (Assume that console is Scanner object initialized to the standard input de
san4es73 [151]

Answer:

Both (i) and (ii) are valid in Java

Explanation:

In (i) 'area' is a variable property of the object myCircle. It could be assigned a value. In this case it has been assigned a value equal to the product of 3.14 and the square of the read input of type double from the keyboard.

After assigning a value to area, it could be printed directly to the console using the println method.

In (ii) 'area' is a method property of the object myCircle. It could be called when the value of the radius(r) has been set using a second method 'set' of myCircle. The call to myCircle.area() probably prints the area of the circle, myCircle, to the console.

In summary, though different, both are valid ways of doing the same thing.

Hope this helps!

6 0
3 years ago
Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
pentagon [3]

Answer:

E. Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

Explanation:

The cisco ios is the operating system of any cisci network device. It is a command line interface used to configure these cisco devices.

The privilege user command "show running-config" in the command line interface is used to show the current configuration on the RAM of the router.

There are two ways to protect the router's console line with a password, with enable secret and enble password. The "enable secret" is a slightly encrypted password but the "enable password" has no encryption. These password methods are used to secure any channel to the router.

The "service password-encryption" command is used to encrypt all the passwords in the current configuration, to prevent attackers or unauthorized users from getting to the router.

7 0
4 years ago
URGENT!!Motors and gears play an important role in the motion of robots. Discuss the different types of motors used in robotics.
seraphim [82]

Answer:There are many types of motors are available in today's market, but mostly Tiny pager motors, servo motors, linear motors, stepper motors and DC geared motors are used in industrial robots according to their application area.  

Humanoid robots can facilitate the experimental evaluation of assistive devices by providing repeatable, measurable, human-like motion while removing the difficulties and potential safety hazards associated with human trials. To ensure that the humanoid robot is providing a valid test platform, the robot must move in a similar way as a human while wearing the assistive device. This challenge is made difficult due to the inherent variability in human motion. In this paper, we propose an approach for a quantitative comparison between human and robot motion that identifies both the difference magnitude and the difference location, and explicitly handles both spatial and temporal variability of human motion. The proposed approach is demonstrated on data from robot gait and sagittal plane lifting.  

hope it helps

5 0
4 years ago
What are the example of dedicated computers?
Drupady [299]
A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources.
8 0
3 years ago
_____ is a higher-level, object-oriented application interface used to access remote database servers
makkiz [27]
RDO.

RDO uses the lower-level DAO and ODBC for direct access to databases.
7 0
1 year ago
Other questions:
  • Accessing programs and documents by way of icon
    12·1 answer
  • Information Can Be Gathered Regarding The Temperature Of A Substance And Uploaded To A Computer Using A ___________ As A Data Co
    6·1 answer
  • Given variables first and last, each of which is associated with a str, representing a first and a last name, respectively. Writ
    13·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • Talia was a scientist whose research compared the birth rates of young
    12·2 answers
  • You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
    9·1 answer
  • What could have made you redesign your plan? Select 3 options.
    6·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • 60 points!
    14·2 answers
  • CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!