1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
2 years ago
6

Moon Questions? (diagram attached)

Computers and Technology
1 answer:
Radda [10]2 years ago
6 0
1). The waxing gibbous phase represents the portion of the cycle of phases
during which the moon appears more than half but less than fully lit, and is growing
as time goes on. In the picture, it's everything from position-3 to position-5. It's
one fourth of the entire cycle, which is 7.4 days, so you'd see it on 7 or 8 consecutive
nights.
(The complete cycle of phases is 29.53 days.)

2). The complete cycle of phases is 29.53 days. Any phase visible on December 21
is visible again on January 19 or January 20.

3). From position-8 to position-5 in the picture is 5/8 of all the way around.
(5/8) of (29.53) = 18.5 days.

4). The locations of high- and low-tides on the Earth are influenced by the position
of the moon and the rotation of the Earth.

5). A lunar eclipse is the result of the moon sailing into the Earth's shadow.
The Earth's shadow is out behind it, opposite to the sun, toward position-5
in the picture, not position-4.
You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
The picture that graphically represents the items you use in Windows is called a/an
Novosadov [1.4K]
The answer to this is Bulls icon
6 0
3 years ago
Read the sentence and answer the question. "Adam Cooper, a cultural strategy officer for the mayor of London, agrees. He thinks
siniylev [52]
<span>I think its pioneers!</span>
8 0
3 years ago
Which pdu is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model?.
yulyashka [42]

The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment.

<h3>What is this PDU about?</h3>

Note that in the transport layer, a host computer is said to often de-encapsulate  what we call a segment so that they can be able to put back data to an acceptable or given format through the use of the application layer protocol that belongs to the TCP/IP model.

Therefore, The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment as it is the right thing to do.

Learn more about host computer from

brainly.com/question/553980

5 0
2 years ago
Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every _______ in order to maintain an upda
densk [106]

Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every 31 days in order to maintain an updated database of people.

<h3>What telemarketing firms do?</h3>

The act of telemarketing is known to be the act talking to potential or existing customers through the use of a telephone.

Conclusively, Note that Telemarketing can help a business firm to promote or boast their products or services, make their customer database stronger, bring about a lot of leads and appointments and others.

Learn more about telemarketing from

brainly.com/question/25974538

6 0
2 years ago
Other questions:
  • In this assignment, you are going to add conditional formatting to the spreadsheet you used in the previous
    13·1 answer
  • Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did n
    13·1 answer
  • Windows domain policy to disable windows 10 update
    7·1 answer
  • What type of printer heats toner to adhere it to the paper? inkjet . impact. 3D. laser.
    6·1 answer
  • One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput
    14·1 answer
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Baking Cookies. Sweet Dough Inc. bakes cookies—a popular dessert—based on the quantities ordered by their customers. Three raw m
    12·1 answer
  • Difrent between computer and computer system​
    9·1 answer
  • Sergio knows that to meet the project requirements, it is essential to have
    9·1 answer
  • Write code to define a function named mymath. The function has three arguments in the following order: Boolean, Integer, and Int
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!