7. In order to check your following distance, use a fixed object and count seconds.
True
False

Answers

Answer 1

Answer:

False

Explanation:

Answer 2

It is true that distance can be checked by counting seconds from a fixed object

How to determine the true statement?

The given highlights are:

Using a fixed objectCounting seconds

When seconds from a fixed object (such as a pole) are counted, the quantity that is being measured is time.

The time recorded can be used along the average speed to determine the distance traveled.

Hence, the given statement is true

Read more about distance and time at

https://brainly.com/question/4931057

#SPJ2


Related Questions

Worksheet-I • Make a list of 10 application software and 5 utility programs installed in your computer, along with their uses. Uses Applications Type​

Answers

Answer:

An antivirus is a utility software that helps to keep the computer virus-free. Moreover, it notifies when any malicious file is detected and removes such files. In addition, it scans any new device attached to the computer and discards any virus if there. Moreover, it also scans the system from time to time for any threats and disposes of them. Examples of antivirus are McAfee Antivirus, Quick heal Antivirus, Windows Defender, etc.

These utility software are used to manage files of the computer system. Since files are an important part of the system as all the data is stored in the files. Therefore, this utility software help to browse, search, arrange, find information, and quickly preview the files of the system.

An important part of a computer is storage space, it is very important to maintain this storage. Therefore, we use certain utility software to compress big files and decrease their size, these are compression tools. The format of the files changes while compressing and we cannot access or edit them directly. In addition, we can easily decompress the file and get the original file back. Examples of compression tools are WinZip, WinRAR, 7-Zip, etc.

These utility software are used to manage data on disks. Moreover, they perform functions like partitioning devices, manage drives, etc. Examples of disk management tools are Mini Tool Partition Wizard, Paragon Partition Manager, etc.

This utility software helps to free up the disk space. In addition, the files which are no longer in use are removed from the disk. Examples are Cortex, C Cleaner, etc.

Explanation:

hope it helps

mark as brainiest

happy to help

ask more I'll help if I know the answer

How could the company benefit by applying Agile principles?

Answers

Answer:

The company could benefit by applying Agile principles managers' job easier and allows them to have greater control over their projects.

What the central difference between negative and positive politeness?

Answers

Answer:

      Politeness is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.

    Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.

What are positive face needs?

  One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.

Negative politeness :

  Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.

What is politeness in discourse analysis?

    In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.

Hope u got it

If you have any question just ask me

20pts! WILL MARK BRAINLIEST ANSWER FAST PLZ!

A ______ is the equivalent of an electronic doorway between a network and a node ​

Answers

Answer:

I think its wan..........

Answer:

i think it might be "header"

Explanation:

Describe the inter-relation and linkage in between traditional knowledge, indigenous knowledge and modern technology.​

Answers

Traditional knowledge is knowledgeable u know

Sample outputs with inputs 9 5 2 -1 in python.

Answers

Sorry phsnjajajajqjkakw

we can not split the cell true or fasle​

Answers

Answer:

You can't split an individual cell.

Explanation:

You can't split an individual cell, but you can make it appear as if a cell has been split by merging the cells above it.


When is innovation good, and when is it problematic?

Answers

Answer:

Innovation is the ability to change the course of the future. ... Finally, innovation is neither good nor bad, however, it is always new. When done correctly it has the power to impact, improve and change the way we live, work and interact. Every company should aspire to be a leader in innovation

Explanation:

general description of the problem

Answers

Explanation:

problem is the misunderstanding misbehaviour etc which harm us and others

A matter or situation regarded unwelcome or harmful is known as problem

Selection sort starts at the beginning of the list and compares pairs of data items as it moves down to the end.
a) true
b) false

Answers

Answer:

false

Explanation:

Hope, it helps to you

Suppose now the file is broken up into 1000 packets with each packet
containing 4,000 bits. Suppose that each packet is acknowledged by the
receiver and the transmission time of an acknowledgement packet is
negligible. Finally, assume that the sender cannot send a packet until the
preceding one is acknowledged. How long does it take to send the file?

Answers

Answer:

The delay to send each packet will be ttrans + tprop. However there is an  additional tprop delay for the acknowledgement packet to arrive at the sender, prior  to which the next packet can be transmitted. Hence the total delay to transmit 10  packet is = 10 * (ttrans + 2 tprop) = 10*(40 msec + 80 msec) = 1.2 sec

Explanation:

In what ways are computers being used to improve our quality of life

Answers

Explanation:

makes info easy to get

improves communication

enhances education

etc

plsss mark me brainliesttt

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software?
a. Train users to scan removable storage devices before copying files
b. Disconnect all computers from the internet.
c. Require strong passwords in the local security policy.
d. Configure all computers with a screen saver password.
e. Configure the software to automatically update its definition files.

Answers

Answer:

The answer is A, E

Explanation:

What are some of the innovations that colored television has undergone since its original invention? (include the date of the innovation)

Answers

Answer:

Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.

Explanation:

Which bar displays the name of the application?

Answers

Answer:

Title bar displays the name of the application.

In what ways are computers being used to improve our quality of life

Answers

Answer:

computers help with our education systemcommunicating with others is easier (emails/text messages opposed to sending an envelope)technological advances

Computer is the electronics devices which input process and output the results.
It helps in education in this pandemic condition we are able to have class through Internet in computers
We use computers in offices to generate income
We run hospital works to computer to outcome the result of patients

in MS Word we can merga cells​

Answers

I do not understand your question could you change it?

Your question doesn’t make any sense

Shift all elements by one to the right and move the last element into the first position. For example, 1 4 9 16 25 would become 25 1 4 9 16.

Answers

Answer:

i see you but i dobt see it

Explanation:

How far should robots be allowed to influence people's lives?

Answers

Answer:

robots should be allowed to influence people's lives in a limit because we don't know the future if because of this small mistake robots can rule us so , we should be prepared from now

The output signal from an analogue sensor is sampled every 195 µs to convert it into a digital representation. What is the corresponding sampling rate expressed in kHz?
According to the Sampling Theorem, for this sampling rate value, what approximately could be the highest frequency present in the signal, in kHz, assuming the lowest frequency is very close to zero?

If each sample is now quantised into 512 levels, what will be the resulting bitrate in kbps?

Give your answer in scientific notation to 2 decimal places.

Hint: you need to determine the number of bits per sample that produces 512 quantisation levels.

Answers

Answer:

A sample rate is just reciprocal of the sample period. According to sampling theorem the highest frequency in single would be [tex]5.13/2=2.565 KHz.[/tex][tex]2^8=512[/tex] So you will need 8 bits to represent.[tex]8 bits \times5.128\times(10)^3[/tex]samples [tex]=41.026[/tex] bits per second.

Explanation:

Sample period of 1 millisecond [tex]=1 kHz.[/tex]

Thus a sample period of [tex]0.195[/tex] milliseconds is

[tex]1/0.195=5.12820513 Hz[/tex]

To determine the sample after [tex]512[/tex] levels quantization, we need to find bits per sample that produces [tex]512[/tex] quantization levels.

Thus,

[tex]2^8=512[/tex]

So you will need 8 bits to represent.

8 bits [tex]\times5.128\times(10)^3[/tex] samples [tex]=41.026[/tex] bits per second.

Learn more about scientific notation, refer :

https://brainly.com/question/10401258

Which model of communication focuses on the meaning that emerges in a relationship between communicators?
a. Transactional
b. Symbolic
c. Complementary
d. Linear

Answers

Answer:

QUESTION

Which model of communication focuses on the meaning that emerges in a relationship between communicators?

[tex]==============================================

[/tex]

CHOICES

a. Transactional

b. Symbolic

c. Complementary

d. Linear

[tex]==============================================

[/tex]

ANSWER

a. Transactional

[tex]==============================================

[/tex]

#CarryOnLearning

(◕ᴗ◕✿)

15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​

Answers

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

Answer: CD Roms.  Virses can infect each other item by actually writing to the device.  For CD Roms, you must have a special writer program to write to the ROM.  

Explanation:

Research the trend of BYOD in workplaces. Compare the advantages to any potential disadvantages. Do you think more companies should adopt this policy? Why or why not?

Answers

Answer:

please mark me brainlist

Explanation:

Bring Your own Device (BYOD) refers to bringing the personal devices on the place where the employees work for the company, as in by accessing the data, systems etc of the company. It is becoming rapidly popular in the traditional workplaces.

Likely we are saying as BYOD is rapidly growing organisation so it is having some advantages and disadvantages.

ADVANTAGES are as follows:-

1) If a company is linked with the byod organisation, this will help in reducing the cost of the devices, as in they do not have to purchase them. In addition to take care of their own devices, employees are generally more likely to do so.

2) With the help of BYOD the productivity of the employees also increases and the reason behind is that the employees or the users are more likely to be more familiar and comfortable with their own devices, to be use by personal. Users or the employees are expert in the navigation and how to use the device policy as they known their own devices very well. Devices are known to them which help to execute the work with more ease. This also leads to make their interest in work continously for long. Another big thing is the User Satisfaction. Users are more satisfy with the device they choose by own for the respective work as compare to the devices that are selected for them.

3) Users can work day and night all along as the devices are their own. They can check their mails, work on them etc in late nights just because of they are having their own devices. Great Flexibility are offered by the BYOD programs. They provide an ease for working anywhere at any place by using the mobile at any time. By the increase in the flexibility, company are more likely to attract top-performing employees from various places.

DISADVANTAGE:-

1) As employees are using their own personal devices so it is quite difficult to manage the security in the respective device, that's why Security become one of the major disadvantage of the BYOD programs. Employees are accessing the sensitive information on the devices that are not fully secure. Whenever the owns a device particularly, they explain how the device will use by blocking some sites, monitoring the activity if needed. One of the biggest security related challenge is to make sure that all the personal devices are fully secured from the external attacks, malware and if they are connected to the internet privately or publicly in the world.

2) BYOD own the devices hence, they are having the benefit to select a small number of devices to support. This will be easier on the IT department as they can become familiar with the devices. It will be more difficult to immediately download software updates and security.

3) Another issue of BYOD programs is of scalability. Employees in the organization  uses personal devices, which is not want by any organizations as simply they don’t have the big network infrastructure to handle all of the traffic burden.

In my opinion bring your own device policy would not be accepted by the companies because company follow a client policy that is employee has to do the work for the client and company have to save there client from employee as many employee wants to start there own company so they bought client from the existence company which is a loss to company and it would became very easy for the employee if BYOD comes to play as they can carry data of the client.

BYOD exists an acronym for “Bring Your Own Device.” It directs to the practice of employees utilizing a personal device for work.

What is BYOD?

Bring Your own Device (BYOD) directs to obtaining personal devices in the area where the workers work for the company, as in by accessing the data, systems, etc of the company. It exists evolving rapidly famous in the traditional workplaces.

Advantages OF BYOD

Employees might become better productive since they remain related to the company.Employees no longer must be in the company’s office to work.The company declines its expenditures by lowering hardware assets.The “freedom” of BYOD can improve employee confidence.

Disadvantages OF BYOD

Employees may not have sufficient antivirus software, firewalls, or other technological protection software established on their appliances.Devices utilized by employees stand vulnerable to theft, loss, or harm.Employees often work at outside Wi-Fi sites that exist not protected and stand vulnerable to strikes by others.Some employees may be utilizing certain software systems that exist not consistent.The employee utilizes his or her instrument for personal reasons while on firm time, reducing productivity.

To learn more about BYOD

https://brainly.com/question/14832722

#SPJ2

The digital system usually operated on?

Answers

Answer:

The digital systems usually operate on binary number system.

jjhb ft fv tuning Denise l Debbie

Answers

What








What the debbie



Answer: is Debbi

Explanation: and what

What was the fisrt computer?

Answers

Answer:

AtanasoffBerry Computer.  It was built by physics Professor John Vincent Atanasoff and his graduate student, Clifford Berry, in 1942 at Iowa State College, now known as Iowa State University.

Explanation:

The First computer is called The Babbage Difference Engine.

I hope this is what you needed

Which of the following computers would be used in a large corporation to complete huge processing needs, such as airline reservations?​

Answers

A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise resource planning, and large-scale transaction processing. I could be wrong though

write a c++ program to find the factorial of a number.

Answers

Answer:

I'm not gonna use recursion for this program.

#include <iostream>

using namespace std;

int main()

{

int input,factorial=1;

cout<<"Enter a number to get it's factorial: ";

cin>>input;

for(int i=1;i<=input;i++)

{

factorial *=i;

}

cout<<"The factorial of the number you entered is: "<<factorial;

return 0;

}

#include
using namespace std;
int main() {
int num,factorial=1;
cout<<" Enter Number To Find Its Factorial: ";
cin>>num;
for (int a=1;a<=num;a++) {
factorial=factorial*a;
}
cout<<"Factorial of Given Number is ="< return 0;
}

Which part of a powertrain control module retains diagnostic trouble codes (DTCs), freeze-frame data, and learned data

Answers

Answer:

Memory and storage section

Explanation:

State the major different between fours types of computers

Answers

Answer:

1. Supercomputers

Supercomputers are very expensive and very fast. They are the most powerful computers we have in the world.

Supercomputers are optimized to execute only a small number of programs. This makes it possible for them to execute these few programs at a very high speed. Due to their inhibiting cost, they are used in high-end places like in scientific research centers. The supercomputer consists of thousands of processors, allowing it to clock in at very high speeds measured by petaflops.

These computer types are also very large in size due to the numerous parts and components involved in their design.

A good example of a supercomputer is Tianhe-2, which is located in the National Supercomputer Center in Guangzhou, China. It features 3.12 million cores, allowing it to run at speeds of 33.86 petaflops.

2. Mainframe Computers

These are large and expensive computers that are capable of supporting thousands of users simultaneously. They are mostly used by governments and large organizations for bulk data processing, critical applications, and transaction processing. They are ranked below supercomputers.

3. Minicomputers

Minicomputers are mid-sized computers. In terms of size and power, they are ranked below mainframes. A minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.

The use of the term minicomputer has diminished since the introduction of microprocessors. These machines are now more commonly called midrange computers.

4. Microcomputers

A microcomputer, also known as a personal computer, is designed to be used by one user at a time. The term microcomputer relates to the microprocessor that is used for the purpose of processing data and instruction codes. These are the most common computer types since they are not very expensive

Other Questions
Search the Internet and scan IT industry magazines or Web sites to find an example of an IT project that had problems due to organizational issues. Write a short paper summarizing the key stakeholders for the project and how they influenced the outcome. Community Gym charges a $40 membership fee and a $65 monthly fee. Workout Gym charges a $190 membership fee and a $55 monthly fee. After how many months will the total amount of money paid to both gyms be the same? What will the amount be? letter to the press about some members of my community dump rubbish near the school QUESTION 2Which is the closest synonym for the word fretfully?A. capablyB. vaguelyc. tenselyD. briskly Suppose the moons orbital plane were exactly aligned with earths orbital plane how often would eclipses occur Including a 9% sales tax an inn charge 149.33 per night (x) + xy + (y) solution what is transverse wave Simplify the expression |-0.8x10| Solve the problem, who will solve this will be marked as brainliest If there is a higher concentration of oxygen outside a cell than there are inside the cell, what will the oxygen molecules do? How did the public reacted to seeing the first recorded human portrait? Were they in awe? Frightened? Curious? Impressed Is this Vista Learning? Do you know what course is it? And how I can get there? Thank you!:) Isolate the variable by adding a constant to each side of the equation 4(x-5)=25 who is bhutan's first king? FeSO4 + KMnO4 + H2SO4 Which of the following does not form caves?a. ocean waves b. lava c. lightning d. ice melts it is used for holding dirty clothes for washing Three painters worked 6 hours each at $35.50 per hour. They used9 gallons of paint at $29.85 per gallon. Find the total charge. what is the the difference between a valley and a plain?