1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
14

Which is a good example of kinetic energy

Computers and Technology
2 answers:
Alexandra [31]3 years ago
5 0

Answer: A. Flying a paper airplane.  

Tju [1.3M]3 years ago
3 0
It probably will be a flying a paper airplane
You might be interested in
Write a program that simulates rolling one die using the following steps: 1. Prompt the user for the number of sides on the die.
Mashcka [7]

Answer:

The program to the given question can be given as:

Program:

//import package.

import java.util.*;                    

//define class.

public class Main                    

{

 public static void main(String ar[])  //define main method.  

 {

Scanner  ob = new Scanner(System.in);     //creating scanner class object.

   Random ran = new Random();                 //creating random class object.

   int roll1,roll2,roll3,number,total=0;          //define variable.

   float avg=0;

   System.out.print("Enter the sides= ");           //print message.

   number = scanner.nextInt();                 //input number by user.

   roll1 = ran.nextInt(number++);         //using random function.

   roll2 = ran.nextInt(number++);

   roll3 = ran.nextInt(number++);

   System.out.print("First roll= ");           //print message

   System.out.println(roll1);               //print value.

   System.out.print("Second roll= ");

   System.out.println(roll2);

   System.out.print("Third roll= ");

   System.out.println(roll3);

   System.out.print("total roll= ");

   total=roll1+roll2+roll3;                            //add all number.

   System.out.println(total);

   System.out.print("Average roll= ");                      

   avg=total/3;                                 //Average of the number.

   System.out.println(avg);

 }

}

Output:

Enter the sides= 4

First roll= 2

Second roll= 3

Third roll= 5

total roll= 10

Average roll= 3.0

Explanation:

In the above program first, we import the package form the user input and random number. In java, there are many packages but we use only the util package because in that package both the class like scanner class and random class are inbuilt. Then we declare the class that name is Main in that class we define the main function. In the main function, we create both class object (scanner class and random class). Then we take input a number from the user and pass into the random function. The random function is used to give a unique number and we pass the number into the random function that is increasing by post-increment operator i.e (X++). Then we print all the rolls and total by add all the roll and at the last, we print an average of it.

7 0
3 years ago
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
Julli [10]

Answer:

import random

def calc_birthday_probability(num_people):

   num_tries = 1e6

   num_duplicates = 0

   tries = 0

   while tries < num_tries:

       total_birthday = {}

       for i in range(1, 366):

           total_birthday[i] = 0

       for count in range(num_people):

           birthday = random.randint(1, 365)

           if total_birthday[birthday] != 0:

               num_duplicates += 1

               break

           total_birthday[birthday] += 1

       tries += 1

   return num_duplicates/num_tries

def main():

   num_people = 10

   p = calc_birthday_probability (num_people)

   print(p)

   num_people = 20

   p = calc_birthday_probability (num_people)

   print(p)

   return

if __name__ == "__main__":

   random.seed(2020)

   main()

Explanation:

  • Run the loop until the value of tries is less than num_tries to do number of trials.
  • Run the loop to create the desired number of birthdays by generating random numbers.
  • Increase  the num_duplicates  variable by 1, if the birthday has  already occurred.
  • Lastly define and then call the main function.

4 0
4 years ago
A/an<br> controls the flow of data between a computer and the network.
strojnjashka [21]

Answer:

The NIC (Network Interface Card)  is the computer network component that controls the flow of data between a computer and the network.

Explanation:

5 0
3 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Other questions:
  • "what do you perform when you want to recall specific records from a database"
    13·1 answer
  • In addition to proposing that planetary orbits are elliptical, what other modification did Kepler make to Copernicus’s model? Pl
    15·2 answers
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Do you know how to change your grades on a printer???????????
    13·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
  • the implications your organization of providing email facilities to individuals in the workplace in terms of security and virus
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!