1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
4 years ago
10

What lever has resistance between the axis (fulcrum) and the force (effort)?

Computers and Technology
2 answers:
devlian [24]4 years ago
5 0
Secound Second class levers have the load between the effort and the fulcrum. An example of a second class lever is a wheel-barrow.
Marat540 [252]4 years ago
3 0

Answer:

second class lever

Explanation:

You might be interested in
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
A user input is when the user interacts with the program by typing.<br> True<br> False
Yuri [45]
The answer is true I think
6 0
3 years ago
Read 2 more answers
How do you start using the Internet?
fgiga [73]

Answer:

it's

D. open web browser

3 0
3 years ago
Read 2 more answers
Which of the following is most likely to own the data resulting from a research project?
fomenos

Answer:

Option C i.e., ODS/Data warehouse is the correct answer.

Explanation:

The following option is correct because ODS/Data warehouse owns that resulting data from that project which is related to research. ODS transfer the data of the database to the data warehouses before processing that data or information in the database which is collected from the different-different sources

4 0
3 years ago
Other questions:
  • Problem Overview You have just moved into a new home, and you have brought all your digital communications devices. After contac
    10·1 answer
  • An effective password can help prevent
    11·2 answers
  • ATM machines respond to request in__________​
    13·1 answer
  • _______ _____ is the process of creating usable computer pograms and applications and the theories behind those processes. Quest
    13·2 answers
  • A tiny spot on an LCD monitor display screen that permanently remains black when it should be activated and displaying color is
    12·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • What's the answer plssss​
    10·1 answer
  • True and false 1. Trace topology is also referred to as tree bus topology. ​
    9·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
  • (Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!