1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
3 years ago
14

You can use ???? a to test tread wear on your tires

Computers and Technology
2 answers:
kramer3 years ago
3 0
What are the answers? you can use a penny
SIZIF [17.4K]3 years ago
3 0

answer

You can use a penny to test tread wear on your tires.
You might be interested in
Which of the following are responsibilities of information security management? Defining the protection required for systems and
Talja [164]

Answer:

all of them are responsibilities

Explanation:

4 0
2 years ago
Plz I need help 30 points
Kisachek [45]

hey mate your ans

in the picture

8 0
3 years ago
Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
Tema [17]

Answer:

(10^6 + 9.9)

Explanation:

Given:

Total number of machine instructions = 1000

Number of page fault in 100 instructions = 1

Number of page faults in 1000 instructions = 10

Time to serve one page fault = 100 milliseconds

Time to serve ten page faults = 100*10 milliseconds = 1000 milliseconds = 10^6 Microseconds

Number of instructions without any page fault = 1000 - 10 = 990

Time required to run 1000 instructions = 10 Microseconds

So, time required to run 990 instructions = (10*(990/1000)) Microseconds = 9.9 Microseconds

So, the total time required to run the program = (10^6 + 9.9) Microseconds

3 0
3 years ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
3 years ago
Respond to the following in 2-5 paragraphs. Give an example of how you can demonstrate active listening.
nadezda [96]
Hey my name is ..... and this do the thesis
8 0
3 years ago
Other questions:
  • Ben uses a table that has few columns. He knows about a particular value in the first column and wants to find the corresponding
    8·2 answers
  • Gary lives in an area that receives high rainfall throughout the year. Which device would be useful to him to maintain his compu
    10·2 answers
  • Which of the following is true about REST?
    12·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable
    13·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
    6·1 answer
  • Define operating system?explain the types of operating system on the basis of use.​
    7·1 answer
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!