1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
6

The (X , y) coordinates of a certain object as a function of time' are given by Write a program to determine the time at which t

he object is the close t to the origin at (0, 0). Determine also the minimum distance.
Computers and Technology
1 answer:
ra1l [238]3 years ago
4 0

Answer:

t = [0:0.01:4];

x = 5*t - 10;

y = 25442 - 120*t + 144;

d = x.^2 + y.^2;

min = 1e+14;

for k = 1:length(t)

if d(k) < min

min = da(k);

tmin = t(k);

end

end

disp('The minimum distance is: ')

disp(sqrt(min))

disp('and it occurs at t = ')

disp(tmin)Output:

>> withLoop

The minimum distance is:

2.5106e+04

and it occurs at t =

4

Explanation:

You might be interested in
In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose
makvit [3.9K]

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

4 0
3 years ago
The staff of the ___________________ will need to enter, maintain, and retrieve data from electronic health records within a hos
Fiesta28 [93]
THe staff of the medical office will need to enter, maintain and retrieve data from electronic health records within a hospital. EHR is the term used which means electronic health records that recorded all the health data of the hospitals.
5 0
3 years ago
Based on​ Sam's description of an information​ system, all of the following are components of an IS except​ _____.
svetoff [14.1K]

Answer:

the answer is A

Explanation:

My smartness

5 0
3 years ago
The main purpose of a honeypot is Select one:
masya89 [10]

Answer:

d. To help security professionals better understand and protect against threats to the system

Explanation:

The main purpose of a honeypot is to attract potential hackers and allow them to have access to a network system that is not the actual live network with close monitoring. This is done so as to learn and understand the intentions of the hacker and how they execute an attack. With this knowledge security professional are in a better position to deal with potential threats and keep the network secure.

4 0
3 years ago
19) If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C
Vadim26 [7]

Answer:

MAXIF

Explanation:

The MAXIF function is a function used in Ms Excel.

  • This function indicates the maximum value located on an array .

Option B

7 0
3 years ago
Read 2 more answers
Other questions:
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • What is a mortgage?
    8·2 answers
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • Which table attributes would this code produce?
    15·1 answer
  • What is a scholary or systemic investigation or injury about a subject?
    14·1 answer
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • 14. For the declaration, int a[4] = {1, 2, 3};, which one is right in the following description-
    12·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • can i get an access code for free online? if yes, what website is it so i can get a free access code?​
    15·1 answer
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!