1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
6

What is the biggest type of gear?A. SpurB.WormC.WheelD.Pinion

Computers and Technology
2 answers:
Bas_tet [7]3 years ago
8 0
I think is A, hope it helps.
AnnZ [28]3 years ago
7 0
The answer to this should be B. Worm. A pinion is a the smallest gear out of the listed ones above. spur would be next then wheel and the biggest if them all would be the spur. I'm not completely sure if my answer is 100% correct, but I feel confident enough about it. Hope this helps. :)

You might be interested in
What is the biggest disadvantage of copying a worksheet into another workbook?
san4es73 [151]
The answer is B)The worksheets may not work in the new workbook.
7 0
3 years ago
A column letter above the grid, also called the ____, identifies each column.
Nostrana [21]

I guess the answer in the blank is Column Heading.

A column letter above the grid, also called the column heading, identifies each column.

8 0
3 years ago
Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
solong [7]

Answer:

Windows Server operating systems are a popular choice for a network because they use wizards and setup devices as the user operating system, making it easier to set up network features work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX

Explanation:

Windows operating system is popular than any other operating system for certain reasons:

1. It provides GUI feature which any layman can access and learn easily

2. The compatibility that it provides makes it more popular

3. It supports most of the software program available in the market

4. The design of Windows is more comfortable when compared to other open source operating system.

Only thing is that it is not a free-ware. Licence needs to be purchased to use it.

6 0
3 years ago
Visual Basic: What are arrays, please give an example code.
Drupady [299]

Answer:

An array is a collection of similar types of data. For example, if we want to store the names of 100 people then we can create an array of the string type that can store 100 names. String[] array = new String[100];

<h2>HOPE ITS HELPS YOU</h2>

4 0
2 years ago
Read 2 more answers
You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco
wlad13 [49]

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

3 0
2 years ago
Other questions:
  • As a safe driver, you cannot, __________
    13·1 answer
  • The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
    11·1 answer
  • The method for updating the main memory as soon as a word is removed from the cache is called
    10·1 answer
  • Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
    8·2 answers
  • Who can provide you with a new password when you have forgotten your old one?
    14·2 answers
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
    11·1 answer
  • Which is a good way to improve your credit score
    5·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • When right-clicking an object, a ____ menu appears, which contains frequently used commands related to the object.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!