1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
10

The part of the poppet valve that contacts the valve seat is called the?

Computers and Technology
2 answers:
Amiraneli [1.4K]3 years ago
6 0
C. is the correct answer
KiRa [710]3 years ago
4 0
C. Margin is the answer
You might be interested in
Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
CaHeK987 [17]

Answer:

ctrl c

Explanation:

4 0
2 years ago
Which of the following is the part of a digital camera that acts as the film?
LenaWriter [7]
It's the 'charge coupled device' (CCD) that captures the image in a digital camera.
3 0
3 years ago
(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are eq
Nostrana [21]

Answer:

#include <iostream>

using namespace std;

void matrix(){

   int row = 5, col = 6;

   int myarr[row][col];

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           if (i == 0){

               myarr[i][x] = (x+1)*(x+1);

          }else if ( x == 0){

               myarr[i][x] = (i+1)*(i+1)*(i+1);

           } else if ( i == x){

                myarr[i][x] = (i+1);

           } else{

                myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];

           }

        }

   }

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           cout<< myarr[i][x] << " ";

       }

       cout<< "\n";

}

}

int main(){

   matrix();

}

Explanation:

The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.

3 0
2 years ago
(Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
Marizza181 [45]

Answer:

When Patricia checks her email use:

POP3

TCP

IP

When Patricia brows a website and log in to post a comment use:

HTTP

TCP

IP

LDAP

Explanation:

Email protocol

Patricia starts to check her email, the email application uses the protocol POP3.

The protocol TCP makes a connection with the server and transport the data.

Patricia receives her emails with the protocol IP on her computer.

Website protocol

Patricia started to surf and the protocol HTTP makes a connection with the internet.

The protocol TCP makes a connection with the server and transport the data.

With the protocol IP, she receives the website data.

With the protocol LDAP, Patricia makes a login to post the comment.

6 0
3 years ago
Digital signatures are as legally acceptable as written signatures.
Leto [7]

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

  • As compare to the electronic signature the digital signature is more secure then that of.
  • The signer's signature is seen on the digital signatures as the physical proof.
  • Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

4 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Question 5
    5·1 answer
  • What view is In a presentation program displays your slides in full screen mode
    6·1 answer
  • The main parts of a lever are the....
    6·2 answers
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • The blank provides access to the internet May also be internal ??
    14·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • YASHARI earns $27,000 per year, is single, and lives in Wyoming. She has $7000 in Direct Subsidized loans and another $19,000 in
    9·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!