1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
11

Your foot brake must be able to stop your car within __________ when it is travelling at 20 mph.

Computers and Technology
1 answer:
ohaa [14]3 years ago
7 0

Answer:

Your foot brake must be able to stop car within 5.18 m

Explanation:

d = s^{2}  / (250 * c_{f} )

d is breaking distance.

s is speed in km/h

c_{f} is coefficient of friction normally 0.8

250 is  constant.

Give the speed in mile first convert it to km/h

1 km = 1.60934 mile

speed in km= 20 * 1.60934

s =32.186 km/h

d=32.186^{2}  / (250 * 0.8)

d= 5.18m

You might be interested in
A custom information feel that helps users find a specific document is called
vichka [17]
A custom information feel that "HELPS USERS FIND A SPECIFIC DOCUMENT"... is what I got out of that sentence.

ANSWER: Search Box?
8 0
3 years ago
Tax preparation software can help prepare and file your taxes by _________.
ludmilkaskok [199]

Answer:

B. Posing questions to collect necessary information

Explanation:

Tax preparation software serves as software that makes filing as well as preparation of tax to be easier.

3 0
2 years ago
What are two specific Netstumbler features that are related to cybersecurity? Name one feature that is related to improving cybe
NikAS [45]

The feature that can improve cybersecurity is the detection of interferences, and the one that can be used by hackers is checking the configuration of networks.

Netstumbler is a program used to identify surround wireless networks. This program is mainly available for Window systems and includes the following features:

  • Detecting wireless networks.
  • Detecting interferences.
  • Checking the configuration of networks.

These features have both a positive and a negative side as they can be used to increase cybersecurity, which is positive, but they can also be used by hackers to attack networks and the devices in them.

One positive feature is the detection of interferences because this can be used to detect possible external or threatening networks. On the other hand, checking the configuration can be a negative feature because hackers can use this information to enter and hack the networks.

Learn more in:  brainly.com/question/17021829

4 0
3 years ago
The closing of the letter should have at least
asambeis [7]

Answer:

Im unclear exactly what it is saying but i think its 2

7 0
3 years ago
What is life all about?
zloy xaker [14]
Life can be about anything........
8 0
3 years ago
Read 2 more answers
Other questions:
  • Si han visto el anime death note esta chido si no lo han visto veanlo es bien vacano
    6·1 answer
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • What is the advantage of using CSS?
    5·2 answers
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, A3 contains 7. You enter in cell A4 the followi
    8·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • Assume that you have 22 slices of pizza and 7 friends that are going to share it (you've already eaten). There's been some argum
    9·1 answer
  • Any Danganronpa fans around here? I'm bored.
    13·2 answers
  • To execute a command object and store the results in a dataset, you use the Group of answer choices Fill method of a data adapte
    5·1 answer
  • Why does it say error on that last line of code
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!