1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
13

Durante 10s, la velocidad de rotación y el momento de giro de las ruedas de un coche eléctrico son 100 rpm y 1405,92 Nm, respect

ivamente. Si el motor eléctrico que lo mueve ha consumido 184 KJ: halla potencia y energía útil en las ruedas
Computers and Technology
1 answer:
Akimi4 [234]3 years ago
6 0

Answer:

c

Explanation:

hope this helps

You might be interested in
Write a Bare Bones program that takes as input a value for X and places 4 times the value of X into the value of Z. The value of
Vlada [557]

Answer:

See the code snippet in the explanation section

Explanation:

import java.util.Scanner;

public class BareBonesProgram{

public static void main (String[] args){

 Scanner scan = new Scanner(System.in);

 System.out.println("Please enter the value of x: ");

 int x = scan.nextInt();

 int z = 4 * x;

 System.out.println("The value of z is: " + z);

 System.out.println("The value of x is: " + x);

}

}

6 0
3 years ago
Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watc
Blababa [14]

Answer:

The person watching Lances friend typing the ATM pin is an example of <u>"shoulder browsing"</u> and Lances friend should <u>"Change the ATM pin."</u>

<u />

<u>I hope this is the answer you were looking for!</u>

8 0
3 years ago
Read 2 more answers
What is the only true way to wipe out every possibility of the virus?
const2013 [10]

Answer: Wipe it completely clean.

Explanation: The only true way to wipe out a possible virus is to wipe a computer completely clean. When you wipe the computer clean, you are starting from scratch and have a better chance of not receiving another virus moving forward.

3 0
4 years ago
A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
devlian [24]

Answer:

A networking administrator is a multi-factor authentication for employees who use company devices by using a VPN. The level of authentication is 802.1X and OTP.

Explanation:

Network administration is the computer network and uses multiple computers. A company and organization uses multiple computers and need a network admin to connect with a different system. Network administrators depend upon the organization. Some duties of the network administration are split and clearly defined such as

Configure the network hardware, servers, and routers

Upgrade the computer networks

Troubleshooting network issues

Assigning the network models

Deploying the software

Managing the servers

Implementing the security and measure

Network administration requires technical competence and will benefit as a network administrator.

For the level of authentication 802.1, X and OTP are suitable for network administration.

5 0
4 years ago
A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
Westkost [7]

Answer:Title

Explanation: Title is basically considered as the "heading" or the "topic" that is used for giving the hint about the content or visual. In context with the visual ,which is the piece of display where title determines about the reason of visual and also hints about the content .It also gives the reference number that a person assign to the visual.

7 0
4 years ago
Other questions:
  • What the address for dns server that the eorkstation will use?
    10·1 answer
  • Which one of the following words means most nearly the opposite of RANDOM? (remember,opposite)
    12·1 answer
  • Which program, available on all operating systems, provides all types of information from a dns server and allows you to query a
    8·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • Which might be included in both your speaking outline and your preparation outline? A. Detailed descriptions of each main point
    8·1 answer
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
    12·1 answer
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
  • Fast i need now ill give anything
    13·2 answers
  • ___________________ describes the process of combining voice, video, and data communications over a common network infrastructur
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!