1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
7

Please answer these thank you....

Computers and Technology
2 answers:
nika2105 [10]3 years ago
5 0

Answer:

1. Don't know.

2. I've noticed that the cord has end points that can produce energy.

3. We use this tool in the picture to jump cars or add energy that something needs.

Explanation:

V125BC [204]3 years ago
5 0

Answer:

1). It is a volt meter.

2).i mean this one depends on whatever you see on it

3).You use one to test and measure electric potential difference between two points in an electric circuit

Explanation:

I hope you get a fat A

You might be interested in
To complete this assignment you will:
german

<u>Answer:</u>

<em>Digital audio </em>

<u>Explanation:</u>

A transducer is a devices which converts energy in one form to another. A speaker is one type of transducer which converts electrical energy into mechanical energy.

<em>Lossless audio:</em> It is a compressed audio format where it stores the audio occupying lesser space without losing any data and can be stored in the digital medium.

<em>Analogy audio:</em> Recording audios in original sounds. Before coming into digital world, records are recorded on the magnetic tape.

<em>Digital audio:</em> Converting audio in 0’s and 1’s which the computer understands.

5 0
4 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
If you look at a white object through a glass of any color, it must appear to remain white.
vodomira [7]
False. It will appear the colour of the glass, but just a bit lighter. It’s like looking through floured water or a balloon
4 0
3 years ago
Given a sorted list of integers, output the middle integer. Assume the number of integers is always odd. Ex: If the input is: 2
ser-zykov [4K]

Answer:

....................................

Explanation:

8 0
3 years ago
Recall the CFG G4 that we gave in Example 2.4. For convenience, let’s rename its variables with single letters as follows. E → E
dimaraw [331]

Answer:

Check the attached image

Explanation:

the diagram for explaning all the solutions is in the attaged images below.

6 0
3 years ago
Other questions:
  • In addition to proposing that planetary orbits are elliptical, what other modification did Kepler make to Copernicus’s model? Pl
    15·2 answers
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • 4. What are five actions you should do to care for your camera?
    15·1 answer
  • You can run a macro by:
    10·1 answer
  • In ____________, a large address block could be divided into several contiguous groups and each group be assigned to smaller net
    7·1 answer
  • Which function works best when you need to remove an element at a pacific index and a list
    15·1 answer
  • Enter a character: * ASCII #42 Enter a character: exit Not a character
    7·1 answer
  • I am a mouse, but im not a mouse.<br><br> What am I?
    12·1 answer
  • Displays information a bout drivers, network connections, and other program-related details.
    6·1 answer
  • List of rules for expert systems​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!