1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
12

Principle of rocket propulsion is based on _​

Computers and Technology
1 answer:
GalinKa [24]3 years ago
4 0
Answer: Newton’s third law of motion
Explanation: The propulsion of all rockets, jet engines, deflating balloons, and even squids and octopuses is explained by the same physical principle—Newton's third law of motion.
You might be interested in
What is the output of this program?
irinina [24]

Answer:

Output: yes

Explanation:

First if statement is satisfied, since numA==2, so yes is printed.

The elif statement is skipped altogether, since elif statements are only evaluated, when the statement above if false, which it is not.

8 0
3 years ago
A business that subscribes to a specific computing model has its entire system fully functional within a short time. What benefi
defon

Its quick development

Quick deployment: When a business opts for cloud computing and subscribes to a specific model, its entire system can be fully functional within a short time—even within a few minutes. The amount of time depends on the kind of technology and the business’s computing needs.


7 0
3 years ago
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
Thomas is getting ready for a presentation. His slides are set, and he's
Harrizon [31]
I think the answer is B because all of the other ones dont make sense and wouldnt work in a time crunch
5 0
4 years ago
Read 2 more answers
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Other questions:
  • What are the best apps to learn coding
    15·2 answers
  • In our networked world, we have more opportunities to stereotype, which is problematic because:
    7·2 answers
  • How can you tell if a motherboard can be watercooled?
    13·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    5·1 answer
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
    7·2 answers
  • In three to five sentences, explain the function of the computer's operating system.
    13·1 answer
  • When you send large attachments, you are not
    14·1 answer
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!