1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
4 years ago
10

Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician

B says that front and rear U-joints on a RWD axle should operate at equal angles to prevent vibration. Which technician is correct?
Computers and Technology
1 answer:
sleet_krkn [62]4 years ago
6 0

Answer:

Technician B is correct only

Explanation:

The actions of technician b helps to eliminate uneven rotating speed which causes vibrations.

You might be interested in
The packets used to transmit voice on the Internet are similar to the packets that are used to send email. What are some of the
Alona [7]

Answer:

Quality of service (QOS).

Explanation:

In recent computer networking, the convergence of voice, video and text data packet has been made possible. There is no need for a dedicated network for a particular type of packet.

QOS or quality of set is a service rendered to voice or audio packets in VoIP phones to enhance communication.

The email is a digital mailing system that can be used to send all three packets. It enjoys the QOS as voice packets. It is given high preference for transmission and uses the TCP protocol to transmit data reliably.

8 0
3 years ago
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Ms Access is spreadsheet software.True or false​
Doss [256]

Answer: I'd say false.

Explanation: An example of a spreadsheet software would be MS Excel. Access does have an option to create a spreadsheet but it also has other uses.

6 0
3 years ago
Read 2 more answers
Matt goes to an Internet café and tries to access his emails. The email client asks Matt to enter his email address along with t
Radda [10]

Answer:

acknowledging

Explanation:

it has to be d

6 0
3 years ago
Other questions:
  • Write a program that prints the block letter “B” in a 7x7 grid of stars like this:
    13·1 answer
  • How do you create a reference page in apa format with all websites?
    5·1 answer
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
    13·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • Which tool is used to view stars in galaxies far from the Milky Way?
    10·1 answer
  • A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device. True False
    15·1 answer
  • "What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
    8·1 answer
  • In your opinion, who is the best Mine.Craft player overall?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!