1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
9

A car manufacturer uses'simulation software during the design process for a new car. Which of the

Computers and Technology
1 answer:
exis [7]3 years ago
5 0

D I,II and III is the answer i think

You might be interested in
You have just used a command that produced some interesting output on the screen. You would like to save that information into a
Bogdan [553]

Answer: A. > interesting.txt

Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.

6 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
alexdok [17]

the function and loop will be

def factorial(x):

   total = 1

   if x != 1 and x != 0:

       for i in range(x,1,-1):

           total *= i

   return total

3 0
4 years ago
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Leno4ka [110]

Answer:

B. Change the router's default administrative password

Explanation:

The best way to prevent any unauthorized use is to change the password to something more secure using 12 minimum characters and including number, symbols, upper and lower case.

4 0
4 years ago
In every programming language, when you access data stored in an array, it is important to use a ____ containing a value that ac
Stells [14]
Subscript

Reference: Chapter 5 of 'An Object-Oriented Approach to Programming Logic and Design's by Joyce Farrell
4 0
3 years ago
Other questions:
  • While investigating the settings on your SOHO router, you find two IP addresses reported on the device’s routing table, which is
    15·1 answer
  • When sending a packet of data from source host to a destination host over a fixed route. Which of the delay components are varia
    8·1 answer
  • Which Boolean operator enables you to exclude a search term?
    9·2 answers
  • What can emulate a fully configured PC or server?
    15·1 answer
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • If a employee has a grade grater than or equal to 18, then he she will get 50% bonous on the basic pay. Otherwise, the employee
    5·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!