1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
13

What does a counterweight do for a mine winding system

Computers and Technology
1 answer:
Georgia [21]3 years ago
4 0
What does a counterweight do for a mine winding system it loads it up
You might be interested in
An online retailer has developed an algorithm to provide personalized recommendations to shoppers. Which form of IPR protects th
Helen [10]

Answer:

should be B.

Explanation:

If not then Im sorry

5 0
3 years ago
Analyze the following code.
vazorg [7]

Answer:

The correct answer for the given question is "The program has a runtime NullPointerException because test is null while executing test.x"

Explanation:

In this code their is run time exception will occur in Main method i.e "java.lang.NullPointerException "because the object of the Test class i.e test will initialized by "null" .So on executing the statement test.x  it gives an Runtime Exception.The "NullPointerException" can occur if we assign the object to the "null" value that why it produce an java.lang.NullPointerException

8 0
3 years ago
What difference between plagiarism and fair use?
Alekssandra [29.7K]
Plagiarism is quite a bad thing because if you plagiarize, you are copying and pasting other people's work and using the work as yours (even though you change the sentence structure/ some words, it is still plagiarizing.) Fair use means un-biasness.
7 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
An_is a sepuence of precise instructions which result in a solution​
Anuta_ua [19.1K]

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

5 0
3 years ago
Other questions:
  • To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
    5·2 answers
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • __________ refers to excavating the sides of an excavation to form one or a series of horizontal levels or steps, usually with v
    12·2 answers
  • When you receive a rejection message from an employer, you should?
    5·1 answer
  • What is the working principle of computer?
    9·1 answer
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • What does the launcher button do? (From Microsoft Word 2016)
    6·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
  • PLEASE HELP WILL MARK BRAINLIEST
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!