1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
9

Help its timed :plzzzzzz fjndf,xn

Computers and Technology
1 answer:
Lerok [7]3 years ago
4 0

Answer:

Please find attached the diagram of the different thrust of the spaceship created with Microsoft Visio with the numbers representing the following situations

(1) Thrust is less than weight. The spaceship does not launch

(2) Thrust is just a little greater than weight. The net force gives the spacecraft acceleration up, but not enough to gain the speed needed to reach orbit

(3) Thrust is greater than weight. The net force gives the spacecraft acceleration up. It gains enough speed to "fall around" Earth, constantly moving in a nearly circular path

(4) Thrust is a lot greater than weight. The very large net force gives the spacecraft a very large acceleration up. It gains so much speed that it escapes Earth

Explanation:

1) The thrust F < Weight = Mass of spacecraft, m × The acceleration due to gravity, g

F < W = m × g, the spacecraft remains on the Earth surface

2) The thrust, F > W, The space craft has an initial upwards acceleration, given by (F - W)/m

v < v_{orbit} \ Orbital \ velocity =\sqrt{\dfrac{G \cdot M}{r} }

3) F > W and  v  =v_{orbit} = \sqrt{\dfrac{G \cdot M}{r} }

4)  F > W and  v  \geq v_{esc} = \sqrt{\dfrac{2 \cdot G \cdot M}{r} }

You might be interested in
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
I know this is not a school type question but i really need some help.
pashok25 [27]
If I'm not mistaken u can't do that but u can go in your settings if u have an iPhone and add that email with your main one.
8 0
4 years ago
Which of the following best explains why property rights are necessary in a
11Alexandr11 [23.1K]

Answer:

A. Property rights allow consumers and producers to make free

choices.

Explanation:

If the consumers and the producers have the properties, then only they can say that well this is free for you, or in other words, can make the free choices. And by no means market forces only work when everyone owns some property, as some also cannot have the property, and hence work hard to earn some property, and thus the Market force does work. And the laws have nothing to do with the free market or the non-free market. And as we saw above, the competition can exist if someone owns the property, and others do not. Hence, the correct answer is A.

5 0
4 years ago
Davos has been reading about encryption recently. He begins to wonder how anything can be secure if everyone is using the same s
vazorg [7]

Answer:

The correct answer is B. Cipher.

Explanation:

Cipher is a system of reversible transformations that depends on some secret parameter, called key, and is designed to ensure the secrecy of transmitted information.

The cipher can be a combination of conventional characters or an algorithm for converting ordinary numbers and letters. The process of making a message secret with a cipher is called encryption. An important parameter of any cipher is the key - a parameter of the cryptographic algorithm, which ensures the selection of one transformation from the set of transformations possible for this algorithm. In modern cryptography, it is assumed that all the secrecy of a cryptographic algorithm is concentrated in the key.

7 0
3 years ago
The three main objectives of information security are
kirill115 [55]

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

7 0
2 years ago
Other questions:
  • ____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
    11·2 answers
  • Write a recursive method public static String reverse(String str) that computes the reverse of a string. For example, reverse("f
    6·1 answer
  • Which is a network of devices built around a person, typically within 10 meters of range?
    5·1 answer
  • If I want to have an estimate of the number of people who visited my website, which metric should I use?
    5·2 answers
  • Computer Works is a computer accessories manufacturer based in Brazil. All customers in South America pay the same freight charg
    15·1 answer
  • Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can
    11·1 answer
  • When you use the .net data provider objects to retrieve data from a database, you can store the data in an object called a?
    8·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • For (int j- 4; j &gt; 0; j--)
    9·1 answer
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!