1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
3 years ago
10

Does the child in the crosswalk have the right of way? Explain why or why not.

Computers and Technology
1 answer:
qwelly [4]3 years ago
3 0
A pedestrian always has the right of way when crossing a street in a crosswalk
You might be interested in
Digital art is created by using __?
taurus [48]
A paint or art program on your computer.
7 0
3 years ago
Object Material: metal or non-metal? Prediction: Will the light bulb light up? Morm Observation: Does the light bulb light up? n
Mandarinka [93]

Answer:

it would be nail key

Explanation

mainly cuz i went to college ad it makes sense ause mettal and metal yw:)

4 0
3 years ago
There are a number of classifications that can be applied to security controls.
kodGreya [7K]

Answer:

Preventive control is not a classification that can be applied to security controls.

Explanation:

At the most basic level, we should protect resources and assets that are of value to an organization by mitigating the risk to those assets and resources. Security controls include any type of policy, technique, procedure, or solution that help mitigate risks. There are models that define security control objectives and are classified by control type and by function

By Control Type

  1. Physical control: Anything that can be touched and can be used to detect and prevent unauthorized access from adversaries and threat actors. Examples include CCTV, electric fences, Biometrics
  2. Technical controls: Examples include firewalls, AMSI solutions, IDSs and IPSs that help protect an organization’s resources and assets. They can be both hardware and software solutions.
  3. Administrative controls: These are the overall design of the protocols or guidelines that define business needs based upon the organization’s security goals that help implement a secure environment. Things like staff awareness and training are among the examples of administrative controls.

Learn more about Security Control classification

brainly.com/question/13239384

brainly.com/question/14409331

#LearnWithBrainly

5 0
3 years ago
A raised dot (ú) shows where the ENTER key was pressed. <br> a. True<br> b. False
MatroZZZ [7]
Its false nothing comes up when u press that key
5 0
3 years ago
A hard drive with a spin speed of 7200 RPM, commences spinning at time = 0, at time = 1.326 ms what is the angle that the disk h
Flura [38]

Answer: I. 57º 17'   II. 1 rad.

Explanation:

A spin speed, implies the relationship between the angle rotated and the time  that has been spinning, which is equal, by definition, to the angular velocity.

ω = Δ∅ / Δt

In order to get the angle rotated in degrees, we need to convert first from RPM (revolutions per minute) to º/sec, as follows:

7200 rev/min *( 1 min/60 sec)* (360º/ 1 rev) = 7200* 6= 43200 º/s

Now, we know that the time passed since it started to spin, was 1.326 msec, i.e., 0.001326 sec.

Remembering that  ω = Δ∅ / Δt, solving for Δ∅, we get:

Δ∅ = 43200 º /s * 0.001326 sec = 57º 17'

II. In order to get the answer in rads, we can convert the rpm to rads/sec, as follows:

7200 rev/min *( 1 min/60 sec)* (2 π/ 1 rev) = 240 π rad/sec.

Applying the same equation as above, we get:

Δ∅ = 240 π rad/s * 0.001326 sec = 1 rad.

7 0
4 years ago
Other questions:
  • What should you do when an error message pops up on the screen?
    9·1 answer
  • The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett
    8·1 answer
  • The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
    9·1 answer
  • As an ICT student teacher using convincing and cogent reasons explain why you think operating system is pivotal in teaching and
    7·1 answer
  • Before you give your presentation to an audience, you should make sure that your ideas are organized in a clear and meaningful w
    8·2 answers
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file.
    7·2 answers
  • How am I supposed to delete my Brainly account if I don't know my password and my E-mail is made up?
    13·2 answers
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
  • I'm doing a VHDL program in Vivado, using a zyboz7 20, which would have 2 teams, each of them with different buttons and led lig
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!