1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
6

The 2 main parts of Aerospace Engineering are aeronautical and astronautical

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
6 0

Answer:

that is ture

Explanation:

Aerospace engineering is the primary field of engineering concerned with the development of aircraft and spacecraft. It has two major and overlapping branches: aeronautical engineering and astronautical engineering.

You might be interested in
Survey data are collected by using all of these methods EXCEPT
castortr0y [4]

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

8 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Pleaseee need help ASAP!!<br><br> Will mark BRAINLIEST!! :)
torisob [31]

Answer:

The correct option is Option B

Explanation:

We need to find examples of client-side code.

Client Side code: The part of code, that doesn't require server for performing specific task

SO, The correct option is Option B

Prompt for special characters in user name

Reason: We can use alert to generate prompt using JavaScript or through validation and it can be done on client side.

All other options, we need to hit the server to perform the task, So they are not client-side code.

6 0
3 years ago
Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
FromTheMoon [43]

Answer:

<h2>I would recommend Python Programming language</h2>

Explanation:

The major reason i recommend python is that It has a ton of resources, and community support, such that it is practically impossible to get stuck while carrying out a project

Python is easy,and lets you build more functions with fewer lines of code.

More so, provides a stepping stone to learning other code and it is a very  flexible language

3 0
3 years ago
What are the six peripherals of a computer system
Lubov Fominskaja [6]
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

4 0
3 years ago
Other questions:
  • The following is true about SPAM ________.
    9·1 answer
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    5·1 answer
  • Professor Zak allows students to drop the four lowest scores on the ten 100 point quizzes she gives during the semester. Design
    13·1 answer
  • _______ allows you to specify how a photo is positioned in the text of your document.
    11·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • Can anyone please help me out
    10·1 answer
  • How do people decide their ethical behavior
    13·2 answers
  • Please help me on this it’s due now
    15·1 answer
  • What changes could you make so that a message, "User input deemed invalid." during designing a simple calculator program for you
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!