1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
7

Identify the symbol. please help!!​

Computers and Technology
2 answers:
MakcuM [25]3 years ago
8 0

Explanation:

counter bore

Tcecarenko [31]3 years ago
5 0

Answer:

Diameter

Explanation:

On technical literature or drawings, it could be a symbol to mean diameter.

You might be interested in
program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are c
mariarad [96]

Answer:

Module Program

   Sub Main()

       Dim A, B, C, x As Double

       A = 2.0

       B = 3.0

       C = 7.0

       x = (C - B) / A

       Console.WriteLine($"Solution for {A}x + {B} = {C} is x = {x}")

       Console.ReadKey()

   End Sub

End Module

Explanation:

For A=0, the program wouldn't work, because then any x would be a solution.

4 0
3 years ago
For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell
larisa86 [58]

Answer:

The pseudocode is as given below while the flowchart is attached.

Explanation:

The pseudocode is as follows

input customer name, number of texts  

Set Basic bill=5 $;

if the number of texts is less than or equal to 60

Extra Charge=0;

If the number of texts is greater than 60 and less than 200

number of texts b/w 60 and 200 =number of texts-60;

Extra Charge=0.1*(number of texts b/w 60 and 200);

else If the number of texts is greater than 200

number of texts beyond 200 =number of texts-200;

Extra Charge=0.25*(number of texts beyond 200)+0.1*(200-60);

Display Customer Name

Total Bill=Basic bill+Extra Charge;

Total Bill after Tax=Total Bill*1.12;

3 0
3 years ago
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
kipiarov [429]

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

4 0
4 years ago
Read 2 more answers
Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
enot [183]

Answer:

Gina did apply Thermal Paste

Explanation:

Thermal Paste contains heat-conductive metals that help to ensure better conduction of heat from the Central Processing Unit and the heat sink of the computer. It is a cooling agent that helps prevents a computer from reaching a high heat level which is harmful to the computer.

5 0
4 years ago
Read 2 more answers
In Python please:
Sauron [17]

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

tan(angleElevation) = tree height / shadow length\\\\tree height = tan(angleElevation) * shadow length

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

4 0
3 years ago
Other questions:
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job?
    10·1 answer
  • You have just installed the microsoft windows 7 operating system on your pc. which web browser is bundled with windows 7 and is
    12·1 answer
  • PLEASEEEEEEEEEEEEEEEEE HELPPPPPPPP
    15·1 answer
  • In terms of in-house custom engines versus third-party engines (like Unity), what has changed today from decades ago, and why?
    8·1 answer
  • What is the difference between a technological problem and a technological opportunity? Explain with an example.
    7·2 answers
  • Python is a popular programming language and has been labeled as having a safe core.
    14·1 answer
  • What is a closed system?​
    7·1 answer
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
  • When creating a report,you can mske groups and subgroups by?​
    5·1 answer
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!