1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
2 years ago
15

Magnetic field strength in an ignition coil is measured in what units?

Computers and Technology
2 answers:
NISA [10]2 years ago
8 0

Answer is D. Hertz

Hope this help!

kolbaska11 [484]2 years ago
3 0
If you meant hertz in d then yes d would be correct
. <span />
You might be interested in
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
2 years ago
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writi
Rzqust [24]

Answer:

Answered below

Explanation:

Class BaseballPlayer{

//Instance variables

string name;

int hits;

int bats;

//Constructor

BaseballPlayer (string a, int b, int c){

name = a;

hits = b;

bats = c

}

public void printBattingDetails( ){

System.out.print(name, hits, bats)

}

}

//Demo class

Class BaseballTester{

public static void main (String args []){

BaseballPlayer player = new BaseballPlayer("Joe", 8, 4)

player.printBattingDetails( )

}

}

8 0
2 years ago
. Which one of the following is not a JAD participant? 1. Managers 2. System analyst 3. Business development manager 4. Users
asambeis [7]

Answer: 3) Business development manager

Explanation:

 JAD stand for joint application development and it is the methodology which basically involved users and client in the development and designing of the application.

It is the process which basically accelerate the designing of the information technology system. JAD involve managers , system analyst and users to develop the dynamic solution. But it does not involve the business development manager as the JAD basically focused o the individual approach in the development.

6 0
3 years ago
Which of the following statements is true? The try block contains the code that handles the exception if one occurs. When a try
Elenna [48]

Answer:

You can have many catch blocks to handle different types of exceptions.

Explanation:

In programming, catch and try are blocks of codes that are written to handle errors. While the try block of code will allow for the definition of code blocks which are tested for errors, the catch block of code allows the programmer to define the block of code to be executed if an error occurs in the try block.... somewhat like the if....else statements. since there could be different error handling scenarios,one can have as many catch blocks for different error exceptions

8 0
3 years ago
Other questions:
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • A(n ____ is a named group of formatting characteristics.
    7·1 answer
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • A user calls the help line and ask for some help installing a new keyboard. He isn't sure how to plug the keyboard into the comp
    15·1 answer
  • PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
    5·1 answer
  • Assume that a signal is encoded using 12 bits. Assume that many of the encodings turn out to be either 000000000000, 00000000000
    9·1 answer
  • Defensive programming is sometimes referred to as _________.
    5·1 answer
  • What is your personal definition of life? How do you appreciate life?​
    10·1 answer
  • Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in
    6·1 answer
  • In the year, , the American Department of Defense put a military research network, called ARPANET online.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!