1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
2 years ago
13

What is pure substance ​

Computers and Technology
1 answer:
nlexa [21]2 years ago
4 0

Answer:

i don't know

Explanation:

I don't understand

You might be interested in
In which of the following scenarios would you choose to embed versus import data?
MrRissso [65]

Answer:

B.)You want to maintain connections with external files

Explanation:

6 0
3 years ago
URGENT!!Motors and gears play an important role in the motion of robots. Discuss the different types of motors used in robotics.
seraphim [82]

Answer:There are many types of motors are available in today's market, but mostly Tiny pager motors, servo motors, linear motors, stepper motors and DC geared motors are used in industrial robots according to their application area.  

Humanoid robots can facilitate the experimental evaluation of assistive devices by providing repeatable, measurable, human-like motion while removing the difficulties and potential safety hazards associated with human trials. To ensure that the humanoid robot is providing a valid test platform, the robot must move in a similar way as a human while wearing the assistive device. This challenge is made difficult due to the inherent variability in human motion. In this paper, we propose an approach for a quantitative comparison between human and robot motion that identifies both the difference magnitude and the difference location, and explicitly handles both spatial and temporal variability of human motion. The proposed approach is demonstrated on data from robot gait and sagittal plane lifting.  

hope it helps

5 0
4 years ago
When you use the Filter feature, what appears in each column label
Scrat [10]
<span>an arrow  ..............................</span>
5 0
4 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
Mamont248 [21]

Answer:

Harley-Davidson Motor Company

Explanation:

Harley-Davidson produces and sells custom-made, touring as well as cruiser motorcycles that feature elegant styling,  modern innovative design, and high quality performance with the ability to customize to ones taste.  Harley-Davidson moved 95% of their x86 server workloads to virtualized environments utilizing VMware infrastructures as of 2018. They report to have being able to have higher system availability, effective and simple disaster recovery capabilities, improved operation efficiencies, and cloud-ready infrastructure. One of the major challenges of virtualization is Security, Virtual systems can easily get compromised.

8 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • What is the Web of Trust?
    12·1 answer
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • The organization of logistics activities within a firm depends on a number of factors, including the number and location of cust
    10·1 answer
  • Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 400 mse
    9·1 answer
  • Write methods to do the following: a. Display three full lines of asterisks on the screen. b. Accept as an argument your name, a
    5·1 answer
  • A disk drive’s data ____________________ rate is a summary performance number combining the physical aspects of data access with
    10·2 answers
  • What format are a setups program file in before executed?
    12·1 answer
  • Each generation is set apart from the previous generation because of an innovation.
    6·1 answer
  • A _______ is a group of elements that you want to style in a particular way.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!