1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alisiya [41]
4 years ago
7

Fact about energy that will make a knex car move

Computers and Technology
2 answers:
Agata [3.3K]4 years ago
8 0
Going down a ramp being pushed
Ira Lisetskai [31]4 years ago
8 0
Kinetic energy?
Or it going down a hill
You might be interested in
Study the editorial cartoon Participation in Youth Sports Down by Dan Landgren Jr.
Sergeu [11.5K]

Answer:

What is the coordinates of points B in the diagram

Explanation:

D

8 0
4 years ago
Read 2 more answers
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
LenKa [72]

Answer:

This is Elijah from FLVS hihi :DDDDDDDDDDDDDDDDDDDDDDDDDDDDD CVS

Explanation:

6 0
3 years ago
Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
natali 33 [55]

Answer:

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Explanation:

When four bits are borrowed from the fourth octet of class C IP address 200.245.10.150, the IP address is subnetted to 16 subnets, where the number of subnets is equal to two raised to the number of borrowed bits (ie, 2^ number of borrowed bits), and 14 assignable host IP address gotten from the formula;

  = 2^(number of host bits in the fourth octet) - 2

  = (2^4) - 2

  = 16 - 2 = 14 host addresses

3 0
3 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
What is the output of the given code?<br><br> A. Compiler error<br> B. 0505<br> C. Smooth<br> D. 0.0
oksano4ka [1.4K]

Answer:

The answer is A. Compile error

Explanation:

In the class Fabric, fabricID has private access. You can only print out out private variables in the class or function they are assigned in.

ps: sorry if I am wrong, I am kind of new to java

6 0
3 years ago
Other questions:
  • Elements of a job application and résumé, like dates and addresses, do not have to be accurate.
    14·1 answer
  • 1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
    9·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • Why CD-ROM is more reliable than floppy disk?​
    14·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • This is a type race kindly join.
    11·1 answer
  • FIRST ANSWER GETS BRAINLIEST IM GIVING 30 POINTS!!!! Select the correct answer. Emma's project team has to create an application
    12·1 answer
  • Suppose you are developing a cricket game in which you are asked to enter score of every ball and can score maximum 6 on each ba
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!