1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
2 years ago
11

Some elementary particles are positively or negatively

Computers and Technology
2 answers:
patriot [66]2 years ago
6 0

Answer: she is right so I agree with Emily.

nasty-shy [4]2 years ago
4 0

Answer: adverse particles and fueled particles are negatively particles while charged particles and progressive particles are positively particles hope this help!

You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2016 server. What capabili
Marina86 [1]

Answer:

The answer is "Clustering"

Explanation:

Clustering is a technique, which includes the Microsoft Windows and the coordination with an individual multi-PC's, that is mostly connected to the local area network, as a single platform.

  • It is cheaper than one device.
  • It enables you to greater machine performance and increases usability and reliability, that's why the answer to this question is "Clustering".
4 0
3 years ago
How to calculate a pid controller
pishuonlain [190]

Answer:

Control by PID1

is a control method often used for servos.

Don't you know what a bondage is? Well, it's a system, capable of reaching and

maintain a setpoint thanks to the measurements it performs.

Imagine, for example, in a car on the highway. You want to drive at 130Km / h

without having to press the accelerator. Your car's cruise control should

by itself maintain this speed. When approaching a slope the system "notices" that for

the same power at the level of the motor, it no longer reaches the 130 km / h setpoint and will add a

little acceleration. Yes but by how much? And how long will it take for the system to

stabilize around the setpoint?

That's the whole servo problem and PID control is one way to solve it!

PID is the most widely used regulator in industry. The idea of ​​this control body is to

intentionally modify the value of the error which remains between the setpoint and the measurement

performed.

For example in the case of a position control the error would be: ε = c (p) - s (p)

In the case of proportional control, the error is virtually amplified by a certain gain

constant that should be determined according to the system.

Setpoint (t) = Kp.ε (t)

What in Laplace gives:

Setpoint (p) = Kp.ε (p)

Explanation:

5 0
3 years ago
What is the Windows command to see the IP configuration of the PC?
lisov135 [29]
The answer is ipconfig
4 0
3 years ago
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
SOVA2 [1]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
5 0
3 years ago
Read 2 more answers
Other questions:
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • The part of the computer that contains the brain or central processing unit is also know as the
    15·2 answers
  • How people have contributed to the advancement of science
    7·1 answer
  • What is a googleplex?
    7·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • A _________ is a component commonly used in an analog pressure gauge. Use letter keys to select choices A microprocessor B press
    8·1 answer
  • Which audio media can be directly sent to the subscribers through an RSS feed?
    6·1 answer
  • Rewrite the Espresso Counter program to Swap or interchange any two rows of the output. Copy and paste just the interchanged par
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!