1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
5

Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?

Computers and Technology
1 answer:
nadezda [96]3 years ago
4 0
<span>D. Transmission I think. I don't know much about cars so I'm not 100%

I hope it helps, good luck! :)</span>
You might be interested in
___ is an example of a calling statement.
Naddika [18.5K]

Answer:

printf("%f", roi(3, amt));

Explanation:

To call the function, we have to put the function name without return type and if the function have parameter then we have to pass the parameter without data type as well.

Let discuss the options:

Option A: float roi(int, double);

it is not a calling, it is used to declare the function. In calling, return type of the function like float and data type of the parameter does not pass like int, double.

Option B: printf("%f", roi(3, amt));

print is used to display the result, inside the print it call the function. It is correct way to call the function.

Option C: float roi( int yrs, double rate);

it is not a calling, it is used to declare the function. In calling, return type of the function like float and data type of the parameter does not pass like int, double.

Option D: float roi( int yrs, double rate)

Same reason as option C.

Therefore, the option B is correct option.

4 0
3 years ago
Read 2 more answers
Indicates how fast the engine is moving in rpms.
lapo4ka [179]
That would be called a <span>tachometer </span>
7 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
_______ is the remote performance of medical exams, consultations, health monitoring and analysis using special medical equipmen
laila [671]

Answer:

eHealth.

Explanation:

eHealth or electronic health is a digital medical platform used to connect individuals to medical treatment they so need but can not receive due to certain barriers.

The eHealth platform uses modern day technology for consultation, examination of patient's health, prescription of medication etc. But it refers patients to trusted medical facilities when the situation is critical.

All these are done electronically through the internet and has eliminated the boundaries of geographical location.

8 0
3 years ago
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
wel

Answer:

Windows\System32\drivers folder.

Explanation:

Eric operates on such a computer which has some failure on system's driver. Although the specific system may not be operational, he will locate the system driver title. Inappropriately he has no Connectivity to the internet.

Windows\System32\drivers directory could move to him to show the file of the system driver. Thus, the following answer is correct according to the given scenario.

3 0
3 years ago
Other questions:
  • What is the day adopt me launched its game on roblox?​
    14·2 answers
  • Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour
    10·1 answer
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • Computer _____ begins with regular maintenance of the computer system such as firewalls, antivirus programs, defragmentation, de
    7·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • in a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n)-------------------- respon
    14·1 answer
  • The following is a true example of a computer: A. Toyota Camry
    12·1 answer
  • How can Technology be used in marketing?
    5·1 answer
  • bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann
    8·2 answers
  • Help its in binary and im a small brain for that
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!