1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
5

In Roblox programming, what constraint are welds subject to?

Computers and Technology
2 answers:
Art [367]3 years ago
7 0

Answer:

Welds are used for things such as car, trucks, buses, trains and etc

Explanation:

REY [17]3 years ago
6 0

welds are a type of JointInstance that rigidly holds their parent part and another part in a fixed position relative to each other, such as holding one part 2 units to the right of another part. They can be used in places where parts need to be held together at odd angles, but still be able to move (meaning they will not work with BasePart.Anchored parts), such as for a vehicle.

You might be interested in
Microsoft Word cannot be used to create personalized web<br> pages.<br> OTrue<br> False
Georgia [21]

Answer:

False

Explanation:

Because Microsoft can be used to create personalized web

5 0
3 years ago
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.
dlinn [17]

Answer:

i think digital signals

Explanation:

A digital signal is a signal that is being used to represent data as a sequence of discrete values; at any given time it can only take on one of a finite number of values.[1][2][3] This contrasts with an analog signal, which represents continuous values; at any given time it represents a real number within a continuous range of values.

6 0
3 years ago
Read 2 more answers
What is the output of the following query? SELECT INSERT ('Knowledgeable', 5, 6, 'SUPER');
Scrat [10]

Answer:

The above query gives an error.

Explanation:

  • The query gives an error because is not the correct syntax of the select or inserts query.
  • The syntax of the select query is as follows: "select Attributes_1_name, Attributes_2_name,...., Attributes_n_name from table_name;".
  • The syntax of the insert query is : "insert into table_name (column_1_name, column_2_name,...,column_n_name) values (column_1_value, column_2_value,...,column_n_value);".
  • The syntax of the insert and select query is : "insert into table_name (select Attributes_1_name, Attributes_2_name,...., Attributes_n_name from table_name);".
  • But the above query does not satisfy any property which is defined above. Hence it gives a compile-time error.
6 0
3 years ago
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
Margaret [11]

<u>Normally windows end user can login 3 ways as follow:</u>

1. End user can Login as local account where user has not connected or even connected to local Area network LAN.

2. Next user can login into cloud accounts nothing but hot mail  accounts

3. Login to windows domain controller where end user should connect to LAN.

Purpose of installation of Windows domain controller with Active Directory is to keep trace and keep log history activities.

Due to windows domain controller with Active Directory end user desktop or laptop has control on software access also.

Every time when end user login on windows domain controller a small modified is executed whenever is required. It is not going effort the workstation performances.

Note: - Domain severs should be POWER on first.

7 0
3 years ago
Which two functions can be used with the math module?
GrogVix [38]

Answer: The math module presents two angle conversion functions: degrees() and radians() , to convert the angle from degrees to radians and vice versa. For example, the following statements convert the angle of 30 degrees to radians and back (Note: π radians is equivalent to 180 degrees).

Explanation: Hopefully this helps you. It is a full answer.

5 0
3 years ago
Other questions:
  • A skier provides what in a landscape photograph of a mountain?
    14·2 answers
  • Which online text source would include a review of a new TV show?
    9·2 answers
  • Question 14. (3.04 MC) how does the project manager evaluate the scope of a project
    14·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • Diligent people are as concerned with the ____ as the ___ of their work
    12·1 answer
  • Which componet is the smallest unit in a spreadsheet
    15·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
  • The computer stores currently used programs and data in ________.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!