1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
12

What is a VIN and what role does it play during a criminal investigation? Explain how a VIN could help in a bomb and/or arson ca

se?
Computers and Technology
1 answer:
KengaRu [80]3 years ago
4 0
VIN is Vehicle Identification Number. This number uniquely identifies a motor vehicle. If a vehicle is used to commit a crime, such as the Ryder truck used to destroy the Murrah building in Oklahoma City, it's VIN number can be used to track down the individual who is connected to that vehicle. In OKC, they were able to find and arrest Timothy McVeigh.
You might be interested in
14. The heart of a computer is<br> a CPU<br> b. Memory<br> c. I/O Unit<br> d. Disks
NNADVOKAT [17]

Answer:

CPU

I dont know a whole ton about computers. But I'm confident this is correct. Without the CPU the other options on this list wouldnt work so the CPU would be the "heart".

3 0
3 years ago
Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
kiruha [24]

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
Network is a process by which several protocols evolve to form a single product.
astraxan [27]

Answer:

Is this like a true or false thing or just a statement?

6 0
3 years ago
Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of d
mario62 [17]

The program calculates the velocity between points in a list is written below. The program is written in python 3 thus ;

t = input("Enter time values : ")

<em>#Enter</em><em> </em><em>the</em><em> </em><em>time</em><em> </em><em>values</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>data</em>

p = input("Enter distance values : ")

<em>#Enter</em><em> </em><em>the</em><em> </em><em>distance</em><em> </em><em>values</em>

dist = [float(x) for x in p.split()]

time = [float(x) for x in t.split()]

<em>#pyt</em><em> </em><em>then</em><em> </em><em>values</em><em> </em><em>in</em><em> </em><em>a</em><em> </em><em>list</em><em> </em>

def partfthat(dist, time):

<em>#initialize</em><em> </em><em>function</em><em> </em><em>that</em><em> </em><em>takes</em><em> </em><em>in</em><em> </em><em>two</em><em> </em><em>parameters</em><em> </em>

vel = []

<em>#empty</em><em> </em><em>list</em><em> </em><em>to</em><em> </em><em>hold</em><em> </em><em>the</em><em> </em><em>calculated</em><em> </em><em>velocity</em><em> </em><em>values</em><em> </em>

i = 0

<em>#indexer</em><em> </em>

while i <= len(dist)-2:

<em>#while</em><em> </em><em>loop</em><em> </em><em>to</em><em> </em><em>iterate</em><em> </em>

v = (dist[i+1] - dist[i]) / (time[i+1] -time[i])

<em>#</em><em>Use</em><em> </em><em>the</em><em> </em><em>velocity</em><em> </em><em>formula</em><em> </em>

vel.append(v)

<em>#append</em><em> </em><em>values</em><em> </em><em>to</em><em> </em><em>the</em><em> </em><em>empty list</em><em> </em><em>created</em><em> </em>

i+=1

return vel

print(avg_vel(dist, time))

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em>.</em><em> </em>

Learn more : brainly.com/question/25681441

4 0
3 years ago
When hundreds, thousands, or even hundreds of thousands of zombie computers are gathered into a logical computer network under t
Ainat [17]
Virus such as a Trojan or Worm, and can cause network crashes.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio
    8·2 answers
  • 1.
    5·2 answers
  • Write the sql command to show which tutor needs to be reminded to turn in reports.
    13·1 answer
  • The continue statement _________.
    11·1 answer
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire
    7·1 answer
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • Task #3 Debugging a Java Program
    14·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!