1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
8

Calculate the voltage between two points of the circuit of an iron through which a current of 4 amps passes and presents a resis

tance of 10 ohms
Plz i need it
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
3 0

def voltage_calculation (i, r):

return i*r

You might be interested in
Explain what 10CLS program does and the write the output​
ludmilkaskok [199]
(CLS)


This text is being printed via the PRINT command."
On the next line, I'll use CLS, which will clear everything I just printed, so you won't even see the preceding text."
Also, you can't give CLS a line to PRINT; it won't actually do anything"
(CLS)
Finally, on line 80, I
3 0
3 years ago
Plz plz plz subsribe to my channel, CookieFunTime
Anastaziya [24]

Answer:

Sure

Explanation:

5 0
2 years ago
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 &lt; 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
3 years ago
Word Bank:
NNADVOKAT [17]

Explanation:

circle with radius and colour red

3 0
3 years ago
Other questions:
  • Floppy disks hold more data than a CD-R/RW.<br> true or false?
    8·2 answers
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the ga
    12·2 answers
  • Images from your .............. can be copied and pasted in a folder on your computer ​
    8·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • What is one way to process your thoughts about the information you are reading?
    15·1 answer
  • A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
    10·1 answer
  • Importancia del sistema operativo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!