1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
2 years ago
6

FIGURE A-1—Use the information in this chart to answer Question 1.

Computers and Technology
1 answer:
Luba_88 [7]2 years ago
5 0
A the breaker point gap is to small
You might be interested in
Write an if-else statement that displays 'Speed is normal' if the speed variable is within the range of 24 to 56. If the speed v
kari74 [83]

Answer:

import java.util.Scanner;

public class Speed{

int speed;

public Speed(int speed){

this.speed = speed;

}

public void checkSpeed(){

if(speed >= 24 || speed <= 56){

System.out.println("Speed is normal");

}

else

System.out.println("Speed is abnormal");

}

public static void main(String...args){

Scanner input = new Scanner(System.in);

int userSpeed = 0;

System.out.println("Enter a speed: ");

userSpeed = input.nextInt();

Speed obj1 = new Speed(userSpeed)

obj1.checkSpeed();

}

Explanation:

4 0
3 years ago
To what extent do preexisting personal biases affect representation in new media
dolphi86 [110]

Answer:

Below

Explanation:

I believe that it's a bit of a case by case scenario. However, personal biases will inevitably show throughout any sort of writing or other presenting within media. That's why you should always be careful about what you read and believe is true

6 0
2 years ago
Difference and similarity between cluster computing and Hadoop ecosystem?<br>​
Marysya12 [62]
  • Some things can be similar and still have some differences. The Hadoop ecosystem is known to be the add-ons that make the Hadoop framework more better for some particular big data needs and tastes.

The Hadoop ecosystem is made up of the open source projects and commercial tools that are often optimized to act on different kinds of work especially to big data. It is very flexible

The differences is that cluster is simply a combination of a lot of computers that is set up to work together as one system but a Hadoop cluster is a cluster of computers that is used only at Hadoop. Hadoop clusters are set up to analyze and storing large amounts of unstructured data only in a distributed file systems.

Learn more about systems from

brainly.com/question/10603992

7 0
2 years ago
Read 2 more answers
Flowgorithm, Design a program that prompts the user to enter a number within the range of 1 through 10. The program should displ
kherson [118]

Answer:

Step by step code along with explanation and output is given below

Explanation:

We can solve this problem using if elif else approach

def main():

# prompts the user to enter an integer from 1 to 10

 num = int (input('Enter a number in the range of 1 to 10:\n'))

# using the if elif print out the roman numeral from 1 to 10

 if num == 1:

   print ('Roman Numeral for 1 is I')

 elif num == 2:

   print ('Roman Numeral for 2 is II')

 elif num == 3:

   print ('Roman Numeral for 3 is III')

 elif num == 4:

   print ('Roman Numeral for 4 is IV')

 elif num == 5:

   print ('Roman Numeral for 5 is V')

 elif num == 6:

   print ('Roman Numeral for 6 is VI')

 elif num == 7:

   print ('Roman Numeral for 7 is VII')

 elif num == 8:

   print ('Roman Numeral for 8 is VIII')

 elif num == 9:

   print ('Roman Numeral for 9 is IX')

 elif num == 10:

   print ('Roman Numeral for 10 is X')

# using the else print out error message whenever user enters any other number not listed above

 else:

   print ('Error! Wrong Input')

# call the main function

main()

Output:

Enter a number in the range of 1 to 10:

6

Roman Numeral for 6 is VI

Enter a number in the range of 1 to 10:

15

Error! Wrong Input

6 0
2 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
2 years ago
Other questions:
  • I just started game development using unity, I’m trying to control my sphere moving on a flat surface using the W,A,S,D keys, if
    11·1 answer
  • Write a Java test program, named TestGuitar, to create 3different Guitars representing each representing a unique test case and
    8·1 answer
  • What are the preset formulas in a spreadsheet called?
    6·2 answers
  • Steve is creating a document with proper nouns, which Word continues to identify as being misspelled.
    7·2 answers
  • A group of computers that are interconnected in order to share information or documents is called a _____.
    7·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Correct answers plz<br><img src="https://tex.z-dn.net/?f=%20%5Csqrt%7Bx-8%7D%20%3D%203" id="TexFormula1" title=" \sqrt{x-8} = 3"
    5·2 answers
  • ____________________________ and _________________________ are 2 negative impacts of the internet on businesses.
    8·1 answer
  • Expresa tu reflexión sobre la necesidad de un código de etica para la IA (inteligencia artificial) , oponia sobre los bots en la
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!