1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
15

WARNING: when people put links in the answer it is a virus DO NOT DOWNLOAD IT

Engineering
2 answers:
inn [45]3 years ago
8 0
Thank youuuu!!!!!!!!!!!!
kobusy [5.1K]3 years ago
6 0

Answer:

Thank you for this!

Explanation:

I was about to click it on a question I saw.

You might be interested in
Which step in the engineering design phase is requiring concussion prevention from blows up to 40 mph an example of?
Charra [1.4K]

Answer:

Target your customers

Explanation:

took the test :)

6 0
3 years ago
The asymmetric roof truss is of the type used when a near normal angle of incidence of sunlight onto the south-facing surface AB
marysya [2.9K]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the step by step explanation to the question above.

6 0
4 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
What is ductile to brittle transition temperature (DBTT)?
vova2212 [387]

Answer: The answer is given below

Explanation:

Ductile to brittle transition temperature (DBTT) is the temperature when there is a pronounced reduction in the ability of a material to absorb force without being fractured.

It shuld be noted that when this happens, the material transitions from ductile to brittle which is known as ductile to brittle transition temperature(DBTT).

DBTT

7 0
3 years ago
Why are scientists and engineers looking for ways to reduce our dependence on fossil fuels? Help
Alchen [17]
Fossil fuels when burned let out toxins and pollution in the air. Because of that scientists and engineers work together to find ways to not be so dependent on fossil fuels so we are not polluting our air.
8 0
3 years ago
Other questions:
  • For each topic, find the total number of blurts that were analyzed as being related to the topic. Order the result by topic id.
    6·1 answer
  • What is 29.95 inHg in kPa?
    5·1 answer
  • Ashworth Lesson 2: Careers for mechanics and technicians exam
    14·1 answer
  • How are popsicles made with juice?
    5·2 answers
  • Determine the voltage which must be applied to a 1 k 2 resistor in order that a current of
    10·1 answer
  • A) Consider an air standard otto cycle that has a heat addition of 2800 kJ/kg of air, a compression ratio of 8 and a pressure an
    7·1 answer
  • Please help will mark brainliest
    10·1 answer
  • Alright, who’s dirty minded cause i am :)
    9·2 answers
  • The on-board computer controls the suspension system based on inputs from?
    10·1 answer
  • If something is 50fficient, how many joules of wasted energy will there be if 750j of energy is put in?’
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!