1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
5

What FAA-approved document gives the leveling means to be used when weighing an aircraft?

Computers and Technology
1 answer:
Anettt [7]3 years ago
6 0

Answer: Type Certificate Day Sheet (TCDS)

Explanation:

Type Certificate Day Sheet (TCDS) is a document of the Federal Aviation Administration popularly called FAA that documents the certification type and data of a product, which includes engine installation, wing loading, information about dimension, weight and balance, operating limitations, that is meant to also be available in the flight or maintenance manual as directed by FAA.

You might be interested in
Where is permanent data in the computer stored? Whenever Jim starts his laptop, he sees some commands and numbers appearing on h
Wittaler [7]

the operating system ithink

4 0
4 years ago
The method used to transfer information to far off place instantly is called​
ahrayia [7]

Telecommunication

Explanation:

4 0
2 years ago
Read 2 more answers
The Register Set that stores temporary results related to the computations are<br>​
Natasha_Volkova [10]

Answer:

ooh Bhai sahab

Explanation:

ooh Bhai Yaar Mata tyo gari sanisanisanisani

5 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Pls help!!!!!!!!!!!!
son4ous [18]

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

5 0
3 years ago
Other questions:
  • Which computer tools allow you to communicate with coworkers, family,and friends
    8·1 answer
  • Write an application that counts by five from 5 through 500 inclusive, and that starts a new line after every multiple of 50 (50
    13·1 answer
  • What is predictive dialing?
    12·1 answer
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • PLZZZZ HELP!!!
    12·2 answers
  • Read the following scenario:
    10·2 answers
  • What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr
    5·1 answer
  • Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
    9·1 answer
  • MCQ: Which of the following network is confined to a relatively small area?
    5·2 answers
  • Click this link to view O*NET’s Work Activities section for Manicurists and Pedicurists. Note that common activities are listed
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!