1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
14

What is the force generated by a rocket motor to propel a spacecraft forward?

Computers and Technology
1 answer:
Burka [1]3 years ago
3 0
That would be D: Thrust
You might be interested in
Which of the following is not one of the four criteria for evaluating websites?
Flura [38]

Answer:validity

Explanation:

Because it dont sound right

5 0
3 years ago
"Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
Feliz [49]

Answer:

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

Explanation:

Let me try as much as I can to explain the concept or idea of iferror in vlookup.

iferror have a typically function and result like an if else statement, its syntax is IFERROR(value,value _ if _ error), this simply means that if the the error is equal to value, value is returned if not, the next argument is returned.

Having said that, feom the question we are given,

let's substitute the value with vlookup function and add an else argument, it will look exactly this way;

IFERROR(VLOOKUP(),"Invalid Staff ID")// now this will set the message if vlookup cannot find the.

On the other hand using the values given, we will have;

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

4 0
4 years ago
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpens
Oksana_A [137]

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

3 0
3 years ago
An I/O-bound program is one that, if run alone, would spend more time waiting for I/O than using the processor. A processor-boun
Lelechka [254]

Answer with Explanation:

An I/O-bound the programs that are used relatively a little processor times and are favored by an algorithm. However, if the processor bound process is denied the processor time for the sufficiently long periods of times, the same algorithms will be granted a processor to the process and it has not use the processors at all in recent pasts. Therefore, the processor bound process will not be the permanently denied to access.

3 0
3 years ago
Sales and marketing users have similar roles, and use similar record types. However, sales uses 3 different fields and marketing
Olenka [21]

Answer:

B. 2 page layouts, 1 record type, 2 profiles

Explanation:

The most efficient way to setup the process is by setting 2 page layouts, 1 record type and also 2 profiles.

7 0
3 years ago
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?
    10·2 answers
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • There are three required elements needed to connect to the internet: hardware, web browser, and __________.
    15·2 answers
  • What is a GUI?
    11·1 answer
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • <img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
    15·1 answer
  • Please tell fast plzzzzzz​
    6·1 answer
  • Help me..and thank you​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!