1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
4 years ago
9

A rocket always rotates about its___?

Computers and Technology
2 answers:
Alex17521 [72]4 years ago
6 0
the first Center of gravity
suter [353]4 years ago
5 0
The first one (Center of gravity)
You might be interested in
Mrs. Jackson wrote a newsletter to the customers of her housecleaning business that included some organizational tips they could
nika2105 [10]
The correct answer is a. effective communication

- - -
Ineffective and barriers to communication are problems that make communication unclear. Workplace communication is at work or at a job. This is not a job newsletter for workers, but for people at home.
5 0
4 years ago
Read 2 more answers
What is the number 5280 in binary
Tpy6a [65]
0001010010100000?
Hopefully I'm right
7 0
3 years ago
Which software application should be used when preparing a budget
Advocard [28]
You could use Microsoft Excel as well as any other spreadsheet or accounting software.
8 0
3 years ago
Read 2 more answers
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
The Electronic Age began in the<br> A. 1940s<br> B. 1970s<br> C. 1980s<br> D. 1990s
sergejj [24]

Answer:

1940

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • 535 = d +4<br> Whats d?????????????????????<br> &lt;33 thnx babes.
    8·2 answers
  • This is the computer âchipâ that interprets computer instructions and processes data:
    13·1 answer
  • If you enjoy exploring,"what would happen if"types of questions and activities,a career in science or technology might be a good
    7·1 answer
  • What device is used to transmit what is effectively a type of Morse code between stations?
    11·1 answer
  • Which popular file format loses some of the information from the image? JPEG TIFF RAW NEF
    12·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • What is a frame injection attack in a wireless network?
    13·2 answers
  • JAVA
    13·1 answer
  • Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each
    10·1 answer
  • ____ is Windows XP system service dispatch stubs to executables functions and internal support functions.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!