1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
13

Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta

tion using an engine dynamometer. Technician B says that duration is the distance that the valve is lifted off the valve seat. Who is right? A. Both A and B B. A only C. Neither A nor B D. B only
Computers and Technology
2 answers:
SSSSS [86.1K]3 years ago
8 0

Answer:

A ONLY

Explanation:

A ONLY

nordsb [41]3 years ago
7 0
The answer is B. A only. The optimum valve timing is found through experimentation using an engine dynamometer. The timing of the opening and closing of the valves is called valve timing. So the use of dynamometer measures the power output of a machine that is why it can measure the optimum valve timing.
You might be interested in
What is wrong with each of the following code segments? int[] values; for (int i = 0; i < values.length; i++) { values[i] = i
tino4ka555 [31]

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"

7 0
2 years ago
What is an elliptic curve cryptosystem (ECC)?
andrezito [222]

Answer:

d. Provides a stronger cryptographic result with a shorter key.

Explanation:

The elliptic curve cryptosystem (ECC) is a public key cipher that provides higher security than other public key cryptosystems, such as the RSA, with shorter key.

So the correct answer is:

d. Provides a stronger cryptographic result with a shorter key.

3 0
3 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
What happens when you create a variable in a video game program?​
gulaghasi [49]

Answer:

A lot can happen, depending on the use of the variable

Explanation:

Lets create a position variable, a common variable in games.

Vector3 position = new Vector3(0, 0, 0);

The above variable initialization creates a new Vector3 object. The Vector3 class contains 3 properties, X, Y, and Z. When you assign the variable 'position' the new Vector3 object, the variable 'position' contains an instance of Vector3 where

X = 0,

Y = 0,

and Z = 0.

The variable 'position' can be used to set the position of a player, or an object.

We can reuse this variable when you want the object or player to move.

position.X = 29

position.Y = -14

position.Z = 47

now the object/player's position is (29, -14, 47).

Variables can be used for basically everything you need in programming, from storing a position, to storing the result of a complex math equation.

7 0
3 years ago
Has replaced the need for landline telephones in many instance​
Vladimir79 [104]

Explanation:

million landlines. During this same time the number of mobile phone lines that have been subscribed to has ...

Characteristics

7 0
3 years ago
Other questions:
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • Write a complete C++ program that do following. Read a positive integer from the user with proper prompt. Assume that this user
    9·1 answer
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • How do governments correct for negative externalities?
    5·1 answer
  • Examine the following algorithm.
    9·1 answer
  • Which of the following is the definition of registration authority ( RA)?
    10·1 answer
  • What did do you do if you made a mistake on a computer?
    14·2 answers
  • How can you say that a painting is real? ​
    7·2 answers
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
  • A debate about city schools are more better than village schools​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!