1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
11

Which of the following is an example of a long-term goal?Developing a lifetime savings plan

Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
7 0

Answer:

Retirement fund/plan ?

Explanation:

You might be interested in
The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
Goshia [24]

Answer:

payload

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.

Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.

5 0
3 years ago
What is modern? explain​
coldgirl [10]

Answer:

modern means present like the moment like for example the iphone 12 is modern because it was made last year or this year i forgot but pretty much it means in the present

Explanation:

7 0
3 years ago
I need someone to explain gor me python coding!
forsale [732]

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

8 0
3 years ago
Your ___________ is what you can see without the presence of an obstruction.
SCORPION-xisa [38]

Answer:

Line of sight

Explanation:

Your line of sight is the noticeable path of travel from your vehicle to your destination area. This line can be obstructed by a curve, a hill, high-forest wooded zones, large trucks, or other obstruction that prevents drivers from seeing the vehicle ahead. Therefore, if you cannot see around an obstruction, you should slow down and be willing to adjust your position until you can reestablish a clear line of sight to your path of travel and targeting area.

8 0
3 years ago
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the syste
velikii [3]

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

7 0
3 years ago
Other questions:
  • Anyone want to talk?
    13·2 answers
  • Explain one way that wartime advances in such areas as computers
    10·1 answer
  • Cartoon Disney question: Snow White asks the dwarfs a question. 2 of them are lying and 3 can only say the truth. The continuati
    10·1 answer
  • Me2540 week 5 assignment<br> what do i want to know?
    9·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • Discuss four ways you will use to reach all pupils who are living at a disadvantaged area.
    14·1 answer
  • 8. How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    6·1 answer
  • Write a structured algorithm that prompts the user to input the name and price of an item and the quantity purchased. It should
    10·1 answer
  • Explain what iteration is and why we need it in code
    11·1 answer
  • A mobile operating system is stored on a ___ chip.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!