1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
4 years ago
12

_______ are fasteners that connect parts and are intended to resist pulling forces. A. Extension springs B. Compression springs

C. Wedges D. Lock washers\
Computers and Technology
1 answer:
madam [21]4 years ago
6 0
The answer is Lock washers
You might be interested in
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
3 years ago
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
3 years ago
Consider the following code segment which makes use of the list deck and the positive integer i: Which of the following could be
ANEK [815]

Answer: A) Steve Andrew Kevin

B) Alex Joe Matt C) Sally Heather Barbie D) Tim Tim Tim

Explanation:

6 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Array Challenge Have the function ArrayChallenge (arr) take the array of numbers stored in arr and return the string true if any
vampirchik [111]

Answer:

The code is given as follows,

Explanation:

Code:

#include <stdio.h>

#include <string.h>  

int n; //to store size of array  

char* ArrayChallenge(int arr[]) //function returns string true or false

{

  int i, j;

  int sum = 0;

  for(i = 0; i < n; i++)

  {

      sum = sum + arr[i]; //count sum

  }  

  for(i = 0; i < n; i++)

  {

      for(j = i+1; j < n; j++) //loop for every two elements in array

      {

          if(arr[i]*arr[j] > 2*sum) //check if proudct of two elements > 2 times sum

          {

              printf("\n%d x %d = %d, 2xSum = %d\n", arr[i], arr[j], arr[i]*arr[j], 2*sum);

              return "true"; //If proudct of two elements > 2 times sum. return true

          }

      }

  }

  return "false"; // If proudct of two elements < 2 times sum. return false

}  

int main()

{  

  printf("\nEnter size of array: ");

  scanf("%d", &n); //read size of array

  int A[n]; //array of size n

  printf("\nEnter array elements: ");

  int i;

  for(i = 0; i < n; i++)

  {

      scanf("%d", &A[i]); //read array from stdin

  }

  printf("%s\n",ArrayChallenge(A)); //ccall function and print answer

 

  return 0;

}

6 0
3 years ago
Other questions:
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a
    13·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Will created an entry in his calendar and marks it as an all day instance which item has he created
    9·1 answer
  • This is used to copy information from cell to cell in the spread sheet
    7·1 answer
  • Who first demonstrated the computer mouse?
    11·1 answer
  • In Python, programmers use square brackets and an index range to slice multiple characters from a string.
    13·2 answers
  • How does PowerPoint know which objects to group? The objects are aligned side by side. The objects are placed in one part of the
    11·2 answers
  • Just a smol question how do i change my username on this?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!