1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
15

Magnetic field strength in an ignition coil is measured in what units?

Computers and Technology
2 answers:
NISA [10]3 years ago
8 0

Answer is D. Hertz

Hope this help!

kolbaska11 [484]3 years ago
3 0
If you meant hertz in d then yes d would be correct
. <span />
You might be interested in
An option already selected by windows is called____ ( default option/ default selection)​.
Damm [24]

Answer:

default option

Explanation:

6 0
3 years ago
Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
polet [3.4K]

Answer:

Find the explanation below.

Explanation:

The six leadership styles described by Daniel Goleman are the;

1. Authoritative: This is applied when the leader wants to motivate a team to achieve greater heights. For example, in a group where the leader expects his team members to complete a project at a specific time,  he comes up with an idea of how they can meet the goal. He tells the group excitedly about this idea. The group in turn now shares this same excitement and gets to work applying the new ideas.

2. Coaching: This is used by the leader to encourage employees who lack motivation. Imagine that an employee known to be efficient at his work is finding it difficult to reach a sales goal. The leader observes this and encourages him, showing him better ways to improve his sales skills. He applies the idea and gets better at his job.

3. Affiliative: The affiliative leader seeks to resolve conflict by connecting people and building their spirits. In a case where the team members are feeling downcast because their well-loved boss is transferred to another branch, the new affiliative leader builds their spirit and helps them get back to work.

4. Democratic: This is needed when the leader seeks opinions from his subordinates. If the company is seeking to make changes to be at par with a competitor, the democratic leader welcomes a variety of opinions from his subordinates on new ways to improve their products and services.

5. Pacesetting: This type of leader leads the way and shows good example. After the leader has shown the group new ways to improve their sales, he applies the same approach in his marketing and has significant results.

6. Coercive: The leader applies this with difficult employees. In a situation whereby an employee has been encouraged on how to improve his skills but he still shows no much improvement, the coercive leader authoritatively tells him to make the needed effort since his job is on line. He shows signs of improvement and the leader uses lighter measures to calm his fears.

3 0
3 years ago
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web b
vampirchik [111]

Answer:

Cloud Computing.

Explanation:

Cloud computing refers to an environment that is computing oriented where the storage and the software are provided as a service of internet and they are accessed with a web browser.There is no direct active management by the user.It is available to many user over the internet.

Hence we conclude that the answer to this question is Cloud Computing.

4 0
4 years ago
Workers in a child care facility or preschool are part of what career path?
dedylja [7]

Answer:

A

Explanation:

Preschool teachers show education

8 0
3 years ago
Read 2 more answers
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
Other questions:
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
  • Who controls communication ethics?
    13·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • What phone had emojis first?
    13·2 answers
  • What are the basic components of a Production System?
    6·1 answer
  • 10^4+10-2=<br>10^4+10-2=
    12·2 answers
  • :3 Brainlsit included! =) 33 points!
    10·1 answer
  • Mrs. Brown is a teacher at the elementary school. As the school year begins, she sends a couple of email messages to her student
    11·1 answer
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • I want know answer for best way to copy formula on MS Access
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!