1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
15

Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
4 0

depends on state laws, definitions. 'Motor Driven Cycle/motor bicycle' not allowed on interstate is less than 150cc and some places have a 15hp minimum- was Ohio minimum few years back. Motor assisted bicycle or moped in some places like New Jersey or UK has a 2 hp, 50cc upper limit with a speed restriction of 20 mph or 30 or 31 mph- if more than that it becomes a 'motorcycle'

You might be interested in
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
Puung.<br>f. Differentiate between second and third Generation Computer<br>IG ANSWER QUESTIONS​
Papessa [141]

Answer:

Second generation computers were based on transistors, essentially the same as first generation computers, but with the transistors replacing the vacuum tubes / thermionic valves.

Third generation computers used printed circuit boards to replace much of the wiring between the transistors. This had the advantage that components could be mass produced, reducing the number of errors because of incorrect wiring and making the component boards replacable.

6 0
3 years ago
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
creativ13 [48]

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

7 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to
jek_recluse [69]

Answer:

The solution code is written in C language.

  1.    srand(seedVal);
  2.    printf(" %d \n", rand() % 9);
  3.    printf(" %d \n", rand() % 9);

Explanation:

srand() is a C library function which seeds the random number generator. The srand() function will take one unsigned integer, <em>seedVal</em>, as input parameter (Line 1).

We can print random integer between (and including) 0 and 9 by calculating the random number modulus by 9 (Line 2-3). This will ensure the final random number will also be between 0 and 9.

5 0
3 years ago
Other questions:
  • Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
    14·1 answer
  • A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends mes
    14·2 answers
  • According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
    5·1 answer
  • How does electricity work in phones?
    14·1 answer
  • Could this be restored? And is it worth the money it’d take?
    9·2 answers
  • What connectors are available for components to be connected externally to the motherboard
    12·2 answers
  • 9. What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin?
    7·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
    12·1 answer
  • ---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o
    9·1 answer
  • The success criteria are used to judge whether a project is successful. False True <br> need it now
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!