1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
6

In an event, it is when an object moves from a prior state to a subsequent state.

Computers and Technology
1 answer:
mel-nik [20]3 years ago
8 0

Answer:

a. True

Explanation:

Objects suffer inertia before a transition is achieved.  Transition is the movement of an object from one state to another.  But, this transition does not happen on its own.  It is usually triggered by an event or series of events.  This means that when the object moves from its prior state to a subsequent state, an event must have occurred to trigger the transition.  Objects, therefore, depend on events or an outside force to remove their inertia.  They are usually in a state of inertia until an outside stimulus stimulates them with some momentum.

You might be interested in
1. It manages the computer's memory and processes, as well as all of its software and hardware.
8_murik_8 [283]

Answer:

B. Computer operating system

Explanation:

the operating system (or OS) manages all of the hardware and software in the computer, and allows hardware and software to communicate.

We can also figure this out by process of elimination: Application software is just a fancy way to say apps, Graphical User Interface (or GUI) are menus that allow a user to use the computer through a visual representation (what you interact with using your mouse), and microcomputer just means a small computer like a laptop or a phone.

6 0
3 years ago
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
What is the final amount stored in value if the computer selects 17 as the
nadya68 [22]

Answer: -17

Explanation:

Our random number is 17. Let's go through line by line.

  1. value is a random number picked which is 17
  2. valueB = 17 / 2 = 8.5
  3. If value is greater than 0 AND value has a remainder of 1, we will set the value to value* -1.
  4. Value is now 17 * -1 = -17

Let's quickly calculate value mod 2. 17 % 2 = is 1. If you're wondering how we did that, the remainder after dividing 8 into 17 twice is 1, because 17 - 16 = 1.

We stop after line 4 because we stop the conditional statement after one condition is filled.

6 0
3 years ago
Describe a psychological challenge of space travel that astronauts can face.
Anna11 [10]

Answer:

Loneliness

Explanation:

It is logical that an astronaught could be lonely up in space due to the absence of loved ones.

6 0
3 years ago
A researcher makes a _____ about another population when she makes a generalization.
Katena32 [7]
Prediction I believe is the answer mark me brainliest please
5 0
3 years ago
Other questions:
  • Most GUIs provide all of the following except _____.
    7·1 answer
  • Powerpoint s _____ feature allows you to set the timing for a video clip
    12·1 answer
  • You can use______ in order to allow the user to browse and find a file at run time.
    15·1 answer
  • Which technique emphasizes the participative development among system owners, users, designers, and builders?A) Rapid applicatio
    11·1 answer
  • Design and implement a set of classes that define various types of electronics equipment (computers, cell phones, pagers, digita
    13·1 answer
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • The purpose of the ________ in a database system is to receive requests from applications and to translate those requests into r
    12·1 answer
  • List safety conditions when downloading shareware, free free where, or public domain software
    14·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • I need solutions to below questions with python code:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!