1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
7

In a four-stroke engine, the time period when both valves are slightly open is called valve

Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
3 0
Answer to my knowledge is d. overlap
You might be interested in
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices qu
Vladimir [108]

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

4 0
2 years ago
Which of the following statements is true of computer networks?
LenaWriter [7]

Answer: (A) Computer networks allow individuals to share many types of resources.  

Explanation:

 Computer network is basically known as digital telecommunication that allowing various nodes to sharing different types of resources in the network. In the computer network, the data link is establish over the cable like wire and optic media in the network.

The network basically allow sharing of the computing network and various types of resources in the networking.

It can allow sharing resources like printers, exchange files and CDs. There are mainly two types of networking that are: LAN and WAN.

5 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
True or false with reason :- profit and loss account is a real account​
frosja888 [35]

Answer:

False

Explanation:

Account of expenses, losses, gains, and incomes is called the Nominal account. Profit and Loss Account contains all indirect expenses and indirect incomes of the firm. Therefore, Profit and Loss Account is a Nominal Account and not a real account.

:)

5 0
2 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • Which command let’s you increase or decrease the on-screen magnification of your document
    11·1 answer
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • How do i confirm my email address on here
    7·2 answers
  • Ian kno da answer tell me
    7·2 answers
  • MyProgramming Lab
    5·1 answer
  • 1. what do to call the process of preserving food by soaking the raw ingredient in salt and water solution.
    14·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!