Make a connection to what you already know about the material
1. during a collision, the person not wearing a seatbelt is already in motion. there is no outside force (the seatbelt) to stop this motion.
2. Kinetic Energy = 0.5 * m * v^2 because velocity is a squared term, doubling the velocity actually quadruples the kinetic energy, making the stopping distance much much greater
3. by the same logic as above, mass is not a squared term, therefore doubling the mass will double the kinetic energy, increasing the stopping distance -- but by not as much as increasing the velocity.
4. because a driver cannot alter the mass of his vehicle, the best way to enter sharp curves would be decreasing velocity (speed)
5. there are many factors that determine the degree of damage (to humans and property in a crash), most notably the size of the vehicle(s) and velocity.
Answer:
nTag
Explanation:
nTag describe -Providing information on freight limitations-Preparing documentation-Packing exhibit materials-Helping to ensure that shipments arrive on time.
Answer:Following is the C program:-
#include <stdio.h>
int fun()//function fun of return type int and it returns value 6.
{
return 6;
}
int main() {
int a, b;
a = 10;
b = a + fun();//adds 6 to a.
printf("With the function call on the right, ");
printf("\n%d ",b);//printing b..
return 0;
}
Output:-
With the function call on the right,
16
Explanation:
The function fun return the value 6 so it adds 6 to a and stores the result in b.
Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.