1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
11

A hammer has an input distance of 2 cm and an output distance of 7 cm. What is its ideal mechanical advantage?

Computers and Technology
1 answer:
KATRIN_1 [288]3 years ago
6 0

Answer: 4

What is its ideal mechanical advantage?

Explanation:

You might be interested in
What private service may occur on a web server?
katrin [286]

I believe the answer is D

3 0
3 years ago
A computer lacks a division instruction and performs iteratively using the technique described on page 300. suppose we wish to e
guapka [62]

Answer:

creating decorative floral arrangements for events

7 0
2 years ago
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
Klio2033 [76]

Answer:

Packets can arrive out of order from the Internet Protocal layer. So,

when out-of-order packets with higher-than-expected sequence number arrives, then gap is detected.

Receiver of an out of order packet would then generate and sends a duplicate acknowledgement (ACK) for already received packet. If retransmission is performed after the first duplicate ACK, it would lead the sender to introduced too many redundant packets in the network.

Hence, TCP designer chose to wait for third acknowledgement (ACK) instead of performing a fast retransmission to avoid redundant packet transmission.

3 0
3 years ago
Please answer these questions! Will mark Brainliest!!
Sergio039 [100]

Answer:

1) bob behnken and doug hurley

2)yes

3) august

7 0
3 years ago
Other questions:
  • Telecommunications devices transmit data in the form of electrical signals. what is the technical term that we use for these sig
    14·2 answers
  • Which is an example of line-of-sight Internet service?<br> Cable<br> DSL<br> Fiber<br> WiMax
    7·1 answer
  • Split a string by string.
    6·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • What is computer networking?
    14·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • What is the grade, as a percentage with two digits after the decimal point, obtained when you graded this 101-question multiple-
    13·1 answer
  • Which of the following BEST describes a permissive software license?
    11·1 answer
  • I will give brainyest
    13·2 answers
  • The SQL SELECT built-in function COUNT ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!