1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
15

Explain how to identify a starting position on a line.

Computers and Technology
2 answers:
kifflom [539]3 years ago
7 0
A position vector expresses the position of<span> an object from the origin of a coordinate system.

</span>Position vector is basically a<span> straight line which has one of its ends end fixed to a body and whereas, the other end is attached to a moving point which tells the </span>position<span> of that specific point relative to the body. As the point accelerates, the </span>position vector<span> will vary its length and the direction accordingly.</span>
podryga [215]3 years ago
3 0
Displacement is defined as the distance, in any direction, of an object relative to the position<span> of another object. </span>Physicists<span> use the concept of a </span>position vector<span> as a graphical tool to visualize displacements. A </span>position vector<span> expresses the </span>position<span>of an object from the origin of a coordinate system</span>
You might be interested in
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns the
spayn [35]

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

<em>See attachment for full program</em>

Download cpp
8 0
3 years ago
The __________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skill
Alex73 [517]

Answer:

Education and experience

Explanation:The Education and experience level of a particular person is a major determinant factor in Information technology.

An Information Security professional is a person who has adequate knowledge and capabilities to implement strategies, systems and techniques in place in order to achieve safety in the use of information technology. Most organisations make the Education and experience of the professional to be of interest when recruiting for an IT position.

6 0
3 years ago
Write a program that applies the Euclidean algorithm to find the greatest common divisor of two integers. Input should be two in
laila [671]

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// function that return greatest common divisor

int g_c_d(int num1, int num2)

{

if (num1 == 0)

 return num2;

return g_c_d(num2 % num1, num1);

}

// main function

int main()

{

// variables

int num1,num2;

cout<<"enter two numbers:";

// read two numbers from user

cin>>num1>>num2;

// call the function and print the gcd of both

cout<<"greatest common divisor of "<<num1<<" and "<<num2<<" is "<<g_c_d(num1.num2)<<endl;

}

Explanation:

Read two numbers from user and assign them to variables "num1" and "num2".Call the function g_c_d() with parameter "num1" and "num2".According to Euclidean algorithm, if we subtract smaller number from the larger one the gcd will not change.Keep subtracting the smaller one then we find the gcd of both the numbers.So the function g_c_d() will return the gcd of both the numbers.

Output:

enter two numbers:5 9

greatest common divisor of 5 and 9 is 1

enter two numbers:-25 15

greatest common divisor of -25 and 15 is 5

6 0
4 years ago
Other questions:
  • I'm curious why I would need to know this on a school learning site.
    12·1 answer
  • What will you do to run a presentation from a computer on which you did not prepare the presentation, and how?
    13·1 answer
  • PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!
    12·1 answer
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • A project manager types a document and prints it. He is using _____. hardware software hardware and software
    12·2 answers
  • Question 1
    10·1 answer
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Who tryna trade in gta my psn is xMadOrNawx-_-
    11·2 answers
  • Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then w
    14·1 answer
  • Television, video, computers, radios, and magazines used by target audiences are all what types of channels?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!