1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
7

Match each context to the type of the law that is most suitable for it.

Engineering
1 answer:
Bas_tet [7]3 years ago
5 0

Answer:

sorry i dont understand the answer

Explanation:

but i think its a xd jk psml lol

You might be interested in
SSL/TLS is used for ________.
Nana76 [90]

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

4 0
4 years ago
Calculate the diameter of pneumatic cylinder to drive a mechanism. The force exerted by the mechanism is 80 N. The return force
sashaice [31]

Answer:

14.27 mm

Explanation:

Force = 80 Newton

Pressure exerted = 5 bar = 5×10⁵ Pa

Pressure exerted = Force/Area

Area = Force/Pressure

Area=\frac{80}{500000}\\\Rightarrow Area=0.00016\ m^2

Area of the cylinder=πd²/4

\Rightarrow \frac{\pi}{4}d^2=0.00016\\\Rightarrow d^2=\frac{4\times 0.00016}{\pi}\\\Rightarrow d^2=0.0002037\\\Rightarrow d=0.01427\ m

Hence diameter of cylinder 14.27 mm

5 0
3 years ago
Aviation ppl onlyyyy ayoooo, thoughts on the A-10 Thunderbolt II?
Vaselesa [24]

Answer:

It’s cool I’d say 8/10 I guess

Explanation:

8 0
3 years ago
) Please label the following statements as either True (T) or False (F). (a) In general, the greater the % of cold work, the sma
Alexandra [31]

Answer:

A. This option is true

B. This option is false

C. This option is true

Explanation:

A. Generally speaking, the greater percentage of cold, the recrystallization grain size would turn out to be smaller. Therefore this true.

B. A higher annealing temperature does not result in smaller recrystallization grain size. Therefore this is false.

C. As the percentage of cold work is greater, the recrystallization temperature would tend to be lower. Therefore this is true.

6 0
3 years ago
Read Shakespeare's "Sonnet 100.”
liraira [26]

Answer: quatrain

Explanation:

Reading the Shakespeare's "Sonnet 100", we can infer that the underlined section is referred to as a quatrain.

The quatrain simply refers to a type of stanza that is made up of four lines. For example, based on the information given, we can deduce that the rhyme scheme for the second quatrain is given as cdcd.

7 0
3 years ago
Other questions:
  • What is a two stroke engine and what is a four stroke engine, please keep the definitions as simple as can be and please explain
    8·2 answers
  • High speed increases the risk of collision because of ALL of these things EXCEPT:
    8·1 answer
  • Name three major heat transfer mechanisms giving one example of each from day-to-day life. Also explain the physical mechanism b
    14·1 answer
  • Can someone please do this for me ive been sick for the past week and am behind
    6·1 answer
  • There are four main goals of an HVAC system. Name the goals and describe their purpose
    8·1 answer
  • What is your opinion on environmental art? Do you consider it art? What about the trans-species art you read about? Do you think
    9·2 answers
  • Express the angular speed of the earth in rad/s and rpm.
    8·1 answer
  • What has alternating electric and magnetic fields that travel in the form of a wave?
    11·1 answer
  • Who do you contact to get your credit report?
    13·1 answer
  • Which of the following became essential to the construction process after the split between design and construction occurred dur
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!