1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
4 years ago
8

CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False

Computers and Technology
2 answers:
Maru [420]4 years ago
8 0
True
they use diff types
CNG uses compressed natural gas
Over [174]4 years ago
4 0

It is True.

CNG cars work much like gasoline-powered cars with spark ignited internal combustion engines. This system introduces fuel into the engine’s combustion chambers, where it is combined with air, and this mixture is ignited by the spark from a spark plug. The differences between these two are the fuel types. CNG uses natural gas (methane) while gasoline-powered (propane) uses liquid petroleum gas.

You might be interested in
Can someone urgently help me with my java code? Ive been working on it for hours and its not working.
Paha777 [63]

Answer:

nm hn hhjjnjjnj j

Explanation:

kjnjnjn jnjubhvcfv

3 0
3 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
Cuando hablamos de entornos digitales de enseñanza aprendizaje a que nos estamos refiriendo
olga2289 [7]

Answer:

Al hablar de entornos digitales de enseñanza y aprendizaje, la frase apunta al avenimiento de medios informáticos y tecnológicos al proceso metodológico de enseñanza de los distintos sistemas educativos a nivel mundial.

Así, la irrupción del internet como medio de búsqueda de información y las herramientas digitales como vídeos, diapositivas y libros electrónicos como métodos de presentación de información han facilitado el acceso de los alumnos y docentes al conocimiento a través de la generación de un entorno digital que permite a estos un acceso mas rápido y abarcativo al conocimiento.

7 0
3 years ago
Write a program that displays, 10 numbers per line, all the numbers from 100 to 200 that are divisible by 5 or 6, but not both.
FromTheMoon [43]

Answer & Explanation:

To print 10 on a line and each number separated by space; you make the following modifications.

print(str(i)+" ",end=' ')

str(i)-> represents the actual number to be printed

" "-> puts a space after the number is printed

end = ' ' -> allows printing to continue on the same line

if(count == 10):

     print(' ')

The above line checks if count variable is 10;

If yes, a blank is printed which allows printing to start on a new line;

The modified code is as follows (Also, see attachment for proper indentation)

count = 0

for i in range(100,201):

     if(i%6 == 0 and i%5!=0) or (i%5 ==0 and i%6!=0):

           print(str(i)+" ",end=' ')

           count = count + 1

           if(count == 10):

                 print(' ')

                 count = 0

7 0
4 years ago
One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
scoundrel [369]

Answer:

flowchart errors

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Name the main technology used to connect computers to devices
    6·1 answer
  • The use of computer hardware and software to analyze biological data, such as dna sequence comparison data, is known as ________
    14·1 answer
  • How it print media used? ​
    9·1 answer
  • What term is given to pieces of computer software that allow you to manage your e-mail from your computer?
    12·1 answer
  • ____ technology is the same as that used in digital watches, or the time display on a microwave oven
    14·1 answer
  • Write only in C, not C++.
    14·1 answer
  • 2. The factorial of a positive integer n is the product of the integers from 1 to n. You can express the factorial of a positive
    6·1 answer
  • 1, and
    9·1 answer
  • The keyboard shortcut to enter the current date in a field is
    11·1 answer
  • Multiple Choice: Circle the letter that corresponds to the correct answer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!