1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
10

What happens when you break a school chromebook​

Engineering
2 answers:
Tasya [4]3 years ago
8 0

Answer:

You get sent to the office an yo parents gon pay for  the chromebook out of your allowance. Then you gon get whipped for breaking it in the first place.

XD

Explanation:

BartSMP [9]3 years ago
8 0
You have to pay for it
You might be interested in
The solid rod BC has a diameter of 30 mm and is made of an aluminum for which the allowable shearing stress is 25 MPa. Rod AB is
nexus9112 [7]

Answer:

The solid rod BC has a diameter of 30 mm and is made of an aluminum for which the allowable shearing stress is 25 MPa. Rod AB is hollow and has an outer diameter of 25 mm; it is made of a brass for which the allowable shearing stress is 50 MPa.

4 0
3 years ago
Gray cast iron, with an ultimate tensile strength of 31 ksi and an ultimate compressive strength of 109 ksi, has the following s
suter [353]

Using an appropriate failure theory, find the factor of safety in each case. State the name of the theory that you are using the theory is max stress theory.

<h3>Wat is the max stress theory?</h3>

The most shear strain concept states that the failure or yielding of a ductile fabric will arise whilst the most shear strain of the fabric equals or exceeds the shear strain fee at yield factor withinside the uniaxial tensile test.”

Stress states at various critical locations are f= 2.662.

Read more about strain:

brainly.com/question/6390757

#SPJ1

3 0
2 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
In the truss below, the vertical reaction force at A is
Montano1993 [528]
It’s c trust just trust
7 0
3 years ago
Column arrays: Transpose a row array Construct a row array countValues with elements 1 to endValue, using the double colon opera
White raven [17]

Answer:

Matlab code with step by step explanation and output results are given below

Explanation:

We have to construct a Matlab function that creates a row vector "countValues" with elements 1 to endValue. That means it starts from 1 and ends at the value provided by the user (endValue).  

function countValues = CreateArray(endValue)

% Here we construct a row vector countValues from 1:endValue

     countValues = 1:endValue;

% then we transpose this row vector into column vector

     countValues = countValues';

 end

Output:

Calling this function with the endValue=11 returns following output

CreateArray(11)

ans =

    1

    2

    3

    4

    5

    6

    7

    8

    9

   10

   11

Hence the function works correctly. It creates a row vector then transposes it and makes it a column vector.

7 0
3 years ago
Other questions:
  • Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technol
    5·1 answer
  • What are the main causes of injuries when using forklifts?
    12·2 answers
  • A gas is compressed isothermally in a piston-cylinder assembly from 7.6 bar, 77 °C to 3.05 bar. Determine the work and heat tran
    11·1 answer
  • What is a network? I'LL MARK BRAINLEST
    12·2 answers
  • What are some quality assurance systems
    11·1 answer
  • . H<br> Kijwhayhwbbwyhwbwbwgwwgbwbwhwh
    6·2 answers
  • _____ can be defined as the rate at which work is done or the amount of work done based on a period of time. (2 Points) voltage
    15·1 answer
  • Matthew bought 13 used video games that were on sale at a store. He paid $84.37 for the games. If each video game cost the same
    13·2 answers
  • Describe the placement of the views in a multi view drawing
    14·1 answer
  • Can someone please answer this, it will be very appreciative
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!