1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
15

When your hands are on home row, they are resting on the____.

Engineering
2 answers:
Yuri [45]3 years ago
6 0

Answer:

they are resting on the numeric keypad

( a,s,d,f,g,h,j,k,l)

i have been doing this typing thing for class hoped this helped

MArishka [77]3 years ago
4 0

Answer:

to which four fingers of each hand return as a base, on a QWERTY keyboard being A, S, D, and F for the left hand and J, K, L, and the semicolon for the right

Explanation:

You might be interested in
The inlet and exhaust flow processes are not included in the analysis of the Otto cycle. How do these processes affect the Otto
lara31 [8.8K]

Answer:

Suction and exhaust processes do not affect the performance of Otto cycle.

Explanation:

Step1

Inlet and exhaust flow processes are not including in the Otto cycle because the effect and nature of both the process are same in opposite direction.

Step2

Inlet process or the suction process is the process of suction of working fluid inside the cylinder. The suction process is the constant pressure process. The exhaust process is the process of exhaust out at constant pressure.

Step3

The suction and exhaust process have same work and heat in opposite direction. So, net effect of suction and exhaust processes cancels out. The suction and exhaust processes are shown below in P-V diagram of Otto cycle:

Process 0-1 is suction process and process 1-0 is exhaust process.

7 0
3 years ago
Ignoring any losses, estimate how much energy (in units of Btu) is required to raise the temperature of water in a 90-gallon hot
Rudik [331]

Answer:

Q=36444.11 Btu

Explanation:

Given that

Initial temperature = 60° F

Final temperature = 110° F

Specific heat of water = 0.999 Btu/lbm.R

Volume of water = 90 gallon

Mass = Volume x density

1\ gallon = 0.13ft^3

Mass ,m= 90 x 0.13 x 62.36 lbm

m=729.62 lbm

We know that sensible heat given as

Q= m Cp ΔT

Now by putting the values

Q= 729.62 x 0.999 x (110-60) Btu

Q=36444.11 Btu

5 0
2 years ago
A right triangle has a height of 20 centimeters and a base of 10 centimeters. What is the área of the triangle
zmey [24]

Answer:

100 cm

Explanation:

...........................

6 0
2 years ago
2. Ackermann's Function is a recursive mathematical algorithm that can be used to test how well a system optimizes its performan
oee [108]

The python program is an implementation of the Ackermann function that a system optimizes its performance of recursion.

As per the question,

Here is an implementation of the Ackermann function in Python:

<em />

<em>def ackermann(m, n):</em>

<em>    if m == 0:</em>

<em>        return n + 1</em>

<em>    elif n == 0:</em>

<em>        return ackermann(m - 1, 1)</em>

<em>    else:</em>

<em>        return ackermann(m - 1, ackermann(m, n - 1))</em>

<em />

<em># get input values for m and n from the user</em>

<em>m = int(input("Enter an integer value for m: "))</em>

<em>n = int(input("Enter an integer value for n: "))</em>

<em />

<em># calculate and print the result of the Ackermann function</em>

<em>result = ackermann(m, n)</em>

<em>print("Ackermann ({},{}) = {}".format(m, n, result))</em>

This implementation follows the logic described in the prompt, using a recursive function to calculate the result of the Ackermann function for the given values of m and n.

To learn more about the Python Program click here:

brainly.com/question/15061326

#SPJ1

<em />

5 0
9 months ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
2 years ago
Other questions:
  • An air-standard cycle with constant specific heats at room temperature is executed in a closed system with 0.003 kg of air and c
    15·1 answer
  • The tolerance for a geometric can be easily identified by reading the _________.
    13·2 answers
  • If you play roblox leave user down bellow
    14·2 answers
  • Write a function called arraySum() that takes two arguments: an integer array and the number of elements in the array. Have the
    14·1 answer
  • An electric power plant uses solid waste for fuel in the production of electricity. The cost Y in dollars per hour to produce el
    10·1 answer
  • A___ remote control can be an advantage to an
    14·2 answers
  • How much energy in joule is added to a 12 g of sample of aluminum (c=0.897 J/g ◦C) to raise the temperature from 20 ◦C to 45 ◦C?
    14·1 answer
  • Why are plastics known as synthetic materials?​
    5·1 answer
  • Help please i will give brainlist
    9·2 answers
  • What is the mode of operation of a ramp digital voltimeter​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!