1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
9

Why communication sattelites are in geosynchronous orbit?

Computers and Technology
1 answer:
madam [21]3 years ago
4 0

Answer:

Communication satellites are in geosynchronous orbit as, orbits are above the equator directly in the earth where the eccentricity is zero in the orbit and the objects which are geostationary are visible motionless in the sky of the earth. So, that is why, the orbit contain artificial satellite and the satellite distance are varying by the longitude.

You might be interested in
A commonly used font style is _____. superscript periwinkle times new roman point
ANEK [815]
Times New Roman is a more commonly used font style, I believe.
5 0
3 years ago
How to jailbreak ios 9.2 ? Is there anyway???!!!!
Leviafan [203]
Use Pangu 9.2 iOS jailbreak installer.
1. get the Pagnu 9.2 installer
2. connect your iOS 9.2 device to your Windows/OS X machine via universal serial bus cord
3. go through with the setup wizard
6 0
3 years ago
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Coding with Loops Worksheet
BartSMP [9]

Answer:

if you give me brainliest i will answer your question

Explan

4 0
3 years ago
Read 2 more answers
Wap to calculate area and circumference of a circle​
Rainbow [258]

Answer:

To calculate the area of circle πr^2 formula.

And,to calculate the circumference we can use 2πr formula.

5 0
3 years ago
Other questions:
  • Please answer quick:))))
    7·1 answer
  • To add a pattern to a page, navigate to the _____ feature.
    7·1 answer
  • Give examples of two IP addresses (that are 100 IP addresses away from each other but the last octet is not greater than .150) t
    15·1 answer
  • Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control
    11·1 answer
  • SOMEONE HELP PLEASE!!!!!
    6·1 answer
  • Each professional association has
    7·1 answer
  • How does science impact the technology?
    8·2 answers
  • Without net neutrality, which of these situations might occur? (Select all that apply.) a cable company might charge different b
    5·1 answer
  • What are the different parts of a word processing program?<br><br> I need this ASAP please help!!
    6·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!