1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
11

How many seconds are required to make a left turn and join traffic?​

Computers and Technology
2 answers:
Westkost [7]3 years ago
8 0
In town: 5-8 seconds
On highways: 10-20 seconds
algol [13]3 years ago
7 0
City - 5-10 seconds
Highway 10-20 seconds
You might be interested in
Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
Gnoma [55]

Answer:

def find_max(num_1, num_2):

   max_val = 0.0

   if (num_1 > num_2): # if num1 is greater than num2,

       max_val = num_1 # then num1 is the maxVal.

   else: # Otherwise,

       max_val = num_2 # num2 is the maxVal

   return max_val

max_sum = 0.0

num_a = float(input())

num_b = float(input())

num_y = float(input())

num_z = float(input())

max_sum = find_max(num_a, num_b) + find_max(num_y, num_z)

print('max_sum is:', max_sum)

Explanation:

I added the missing part. Also, you forgot the put parentheses. I highlighted all.

To find the max_sum, you need to call the find_max twice and sum the result of these. In the first call, use the parameters num_a and num_b (This will give you greater among them). In the second call, use the parameters num_y and num_z (This will again give you greater among them)

5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
What does the group feature allow you to do?
Viktor [21]

The answer is A, "It allows you to join a group as a member or to create your own group."

5 0
3 years ago
What is the most popular gaming computer brand rn, 2022
tankabanditka [31]

Answer:

hp/omen  or  SONY

Explanation:

because hp has been making a lot better computers, and possibly SONY because the ps5 release that came out a couple years ago.

4 0
2 years ago
Read 2 more answers
A ________ is designed for a individual user<br><br>Plz help :)
Natali [406]
It is a Profile (i think)
4 0
3 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • Data bars describe a graphic element that
    9·2 answers
  • What possible effects could cyber attack have on Johannesburg stock exchange
    6·1 answer
  • Write a statement containing a logical expression that assigns true to the
    13·1 answer
  • Adding functionality to a Button is easy when you use the IDE. After you have dragged a Button onto a Form, you can ____ it to c
    7·1 answer
  • The command button to protect a document is part of the​.
    10·1 answer
  • Juan created new video game for his coding course. What is one way he can explain his code in everyday language?
    7·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • What are computer specification​
    12·2 answers
  • A social service agency hires accenture to improve training and experiences for caseworkers. What is one way accenture can use v
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!