1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
7

A cathedral hull allows the boat to do what

Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0
It allows power boats to have stability while cruising. The cathedral hull  is like a trimaran in terehat it has one main  and two side hulls stuck together so that has a somewhat square to rectangular shape and therefore exhibits greater stability than a single hulled boat. It became more popular with the advent of fibreglass boats in the 1960's and '70s.
You might be interested in
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
I have a question involving do and for loops while using arrays.
larisa86 [58]

Answer:

i just got my new pc

Explanation:

5 0
3 years ago
Implement a class that simulates a traffic light. The next function advances the color in the usual way, from green to yellow to
marusya05 [52]

Answer:

Explanation:

The following is written in Java. It creates the trafficLight class which holds the currentLight string variable and a int count variable for the number of times the light has been red. It also contains two constructors one that takes the currentLight as a parameter and one that does not. Finally, it has the next() method which analyzes the currentLight status and changes it to the next light. Output can be seen in the attached picture below.

class Brainly

{

   public static void main(String[] args)

   {

       trafficLight traffic_light = new trafficLight();

       System.out.println("Current Light: " + traffic_light.currentLight);

       traffic_light.next();

       System.out.println("Current Light after change: " + traffic_light.currentLight);

       

   }

}

class trafficLight {

   String currentLight;

   int count = 0;

   public trafficLight(String currentLight) {

       this.currentLight = currentLight;

   }

   public trafficLight() {

       this.currentLight = "red";

       count++;

   }

   public void next() {

       if (this.currentLight == "green") {

           this.currentLight = "yellow";

       } else if (this.currentLight == "yellow") {

           this.currentLight = "red";

           count++;

       } else {

           this.currentLight = "green";

       }

   }

}

7 0
3 years ago
Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w
ANEK [815]

Answer:

B. client server

Explanation:

Someone hacked into an employees computer and erased all of their data. The employee had last performed a backup three weeks back. This means that there is a backup server in the company. In other words, the network architecture is of the form client-server where data from the employee computers is backed up to a centralized repository from where content could be restored. Hence option B represents the most likely choice.

6 0
3 years ago
Read 2 more answers
True or false? (a) Main memory is volatile. (b) Main memory is accessed sequentially. (c) Disk memory is volatile. (d) Disk memo
allochka39001 [22]

Answer:

The answer to your question is true

5 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Which of the following best describes the protocols used on the Internet?
    7·1 answer
  • After merging two arrays is complete you need to
    11·1 answer
  • You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
    14·2 answers
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • What is outlook used for?
    14·2 answers
  • Write a function that takes as input a single integer parameter n and computes the nth Fibonacci Sequence number. The Fibonacci
    8·1 answer
  • What is the gear ratio?
    12·1 answer
  • Please its argent and I will give you BRAINLIEST ANSWER 6. How would you confirm that a colourless liquid given to you is pure w
    10·1 answer
  • You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!