suppose a class named sportscar is a subclass of a class called automobile. automobile has only two methods: accelerate and addgas. which statement is true?

Answers

Answer 1

Given the class named sports car, which is a subclass of a class called automobile and automobile has only two methods: accelerate and addgas. The statement that is true is that the sports car inherits the accelerate and addgas methods from the automobile class.

The concept of inheritance allows one class to inherit the properties and functionalities of the existing class. The class from which the properties are derived is called the parent or base class. The class that receives the properties is called the child or subclass. In Java, the keyword used to inherit properties is extends. The child class inherits all the methods and properties of the parent class with the exception of constructors.Suppose we have two classes, ClassA and ClassB. ClassA is the superclass of ClassB.

This implies that ClassB is a subclass of ClassA. In Java, we use the extends keyword to derive a subclass from a superclass. This is demonstrated below:class ClassA {public void methodA() {}}class ClassB extends ClassA {}The ClassA contains only one method, methodA(). The ClassB inherits this method from ClassA. This means that the ClassB can now use the methodA() without having to redefine it.Similarly, the sports car inherits the accelerate and addgas methods from the automobile class.

To know more about subclass  visit:

https://brainly.com/question/14315635

#SPJ11


Related Questions

Bran is writing a book on operation system errors. Help him complete the sentences.
1. run time, logic, syntax
2. buffer, run time, syntax

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

A            logic           error occurs when a program runs accurately, but yields the wrong result. Therefore, it is difficult to detect. However, a program can detect       syntax                    errors rapidly, because they occur in the structure of programming code during the compilation stage.

search the internet for examples of logic bombs. select four logic bombs and write a report about them. who was responsible? when did the bombs go off? what was the damage? what was the penalty for the person responsible? did the organization make any changes after the attack? how can they be prevented?

Answers

A logic bomb is a type of malicious software, or malware, that is designed to execute a set of instructions when a specific trigger or condition is met. The instructions are typically destructive in nature and can cause serious damage to computer systems or networks.

Here are four examples of logic bombs and their impact:1. Timothy Lloyd's logic bomb at Omega Engineering: In 1996, Timothy Lloyd was fired from his job at Omega Engineering. Before leaving, he planted a logic bomb in the company's computer system that was set to go off on his birthday the following year. When the bomb went off, it deleted critical files and caused $10 million in damages. Lloyd was sentenced to 41 months in prison.2. Charles T. Smith's logic bomb at The Phoenix Gazette: In 1989, Charles T. Smith was fired from his job at The Phoenix Gazette. He responded by planting a logic bomb in the paper's computer system that was set to go off 8 months later.

Smith was sentenced to five years of probation and ordered to pay restitution.3. David Tinley's logic bomb at Pacific Northwest National Laboratory: In 2014, David Tinley was fired from his job at Pacific Northwest National Laboratory. Before leaving, he created a logic bomb that was set to go off after a certain number of failed login attempts. The bomb went off several months later and deleted critical system files.

To know more about visit:

https://brainly.com/question/29786858

#SPJ11

Explain the features of super computer

Answers

Answer:

Features of Supercomputer

They have more than 1 CPU (Central Processing Unit) which contains instructions so that it can interpret instructions and execute arithmetic and logical operations. The supercomputer can support extremely high computation speed of CPUs.

fluctuations in business activity commonly are referred to as cycles. which of the following industries is best described as counter cyclical?

Answers

Fluctuations in business activity that occur over time are often referred to as cycles. These cycles can be classified into three categories: expansion, peak, and contraction.


When we talk about counter cyclical industries, we refer to those that tend to perform well during economic downturns or contractions. These industries can be seen as inversely related to the overall business cycle. One example of a counter cyclical industry is the healthcare sector.

During economic contractions, people may reduce spending on non-essential goods and services. However, healthcare is considered an essential service, meaning that demand for healthcare services remains relatively stable or even increases during economic downturns.

To know more about Fluctuations visit:

https://brainly.com/question/33920737

#SPJ11

according to the domain name system (dns), which of the following is a subdomain of the domain ?

Answers

The subdomain of the domain example.com is "about.example.com." It follows the subdomain format and is part of the larger domain.

According to the domain name system (DNS), the subdomain of the domain example.com is "about.example.com." In the DNS hierarchy, a subdomain is created by adding a prefix to the main domain name. In this case, "about" serves as the prefix, making "about.example.com" a valid subdomain.

It follows the proper subdomain format of prefixing a subdomain name before the main domain name, separated by a dot. It is important to note that "example.com/about.html" is not a subdomain but a URL path within the domain example.com.

Similarly, "example.com.about" is not a valid subdomain since it does not follow the correct subdomain format. Additionally, "example.org" is an entirely different domain and not a subdomain of example.com.

Learn more about DNS here: brainly.com/question/31932291

#SPJ11

Complete question:

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

example.com/about.html

example.com.about

example.org

what are the fundamentals that a developer should consider when working to wire up model binding correctly?

Answers

When working to wire up model binding correctly, there are a few fundamentals that a developer should consider. Here are some of them: Make sure that the form being submitted is submitting data that is correctly formatted according to the model’s attributes. If the data is not formatted correctly, the model binder will not be able to bind the data to the model.

Examine the values being submitted for things like null, empty, or invalid values. Consider how to handle these values and how they will be handled when they are loaded into the model. Be sure that all of the properties on the model are correctly set up and have the correct data types.

This will help ensure that the model binding is done correctly. When binding to a list, make sure that the model is set up to receive the data correctly. Consider how to handle scenarios where the list is empty or where items in the list are null or invalid values.

The model should be validated after it has been loaded, and any errors should be displayed to the user. This will help ensure that the user is aware of any errors that have occurred in the binding process.

To know more about model’s attributes visit:

https://brainly.com/question/28163865

#SPJ11

q46. while customizing the quick tools toolbar, you would like to add vertical dividers to organize the tools. which icon in the customize quick tools options will enable you to do this?

Answers

To add vertical dividers to the Quick Tools toolbar, you can use the "Separator" icon in the Customize Quick Tools options.

To add vertical dividers and organize the tools in the Quick Tools toolbar, follow these step-by-step instructions:

Right-click anywhere on the Quick Tools toolbar or click on the ellipsis (...) at the right end.From the drop-down menu, select "Customize Quick Tools."The "Customize Quick Tools" window will appear, displaying available options.Locate and click on the "Separator" icon.Drag and drop the separator icon to the desired position in the toolbar.Repeat the previous step to add additional separators for further organization.Once you have positioned the separators as desired, click "Save" or "OK" to apply the changes.The vertical dividers will now appear in the Quick Tools toolbar, helping you visually separate and organize the tools based on your preferences.

By following these steps, you can efficiently add vertical dividers to the Quick Tools toolbar and enhance the organization of your tools.

For more such question on toolbar

https://brainly.com/question/1323179

#SPJ8

which partition of the hard drive is concealed from the user in the file explorer within windows 10 and is only used when imaging the computer back to its factory default state?

Answers

In Windows 10, the partition that is typically concealed from the user in the File Explorer and used for imaging the computer back to its factory default state is known as the "Recovery Partition."

This partition is created by the computer manufacturer during the initial setup and contains the necessary files and system images to restore the computer to its original state.

The Recovery Partition is usually hidden to prevent accidental modifications or deletions by the user, as its contents are critical for system recovery.

By keeping it hidden, the average user is less likely to interfere with its functionality.When a user wants to restore their computer to its factory default state, they can typically do so by accessing the recovery options during the boot process or through specific system settings.

The computer will then use the files and system images stored in the Recovery Partition to reinstall the operating system and restore the computer to its original configuration.

It's worth noting that while the Recovery Partition is hidden from the File Explorer, it can still be accessed using disk management tools or specialized software designed for managing partitions.

For more such questions on partition,click on

https://brainly.com/question/31356414

#SPJ8

The partition of the hard drive that is concealed from the user in the file explorer within Windows 10 and is only used when imaging the computer back to its factory default state is known as a recovery partition.

What is a recovery partition?

A recovery partition is a segment of the hard drive of a computer that contains all of the necessary software, drivers, and files needed to restore the system to its factory settings. This partition, which is often hidden from the user, can be used to repair or restore a system in the event of a critical error or virus infection.

It may also be used to recover data that has been lost or deleted.

To know more about recovery partition visit:

https://brainly.com/question/32329065

#SPJ11

I can''t find my phone and it''s dead. Is there an app or something that you search on your computer and it can help you find it? I''ve been looking for it everywhere!

:(

Answers

Find my iphone on another phone

Which are factors that go into a project plan? choose four answers
Scope
Outcome
Roles
Statement Benchmarks
Demographics
Benchmarks
This is digital design work

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The four factors that go into project plan are:

ScopeOutcomeBenchmark and Role.

The four factors key components of any project plan. without these factors project plan is incomplete. Because, the project has scope and output, the benchmark that is going to be achieved and role and responsibilities for doing specific tasks etc.

A project plan is a formally approved document that guides project execution and project control. They have planning assumption and decisions. They also facilitate communication.

Factors such as the goals, budget, timeline, expectation, and teamwork. The other factors includes the Scope, Roles,  Statement Benchmarks  and the Demographics.

Hence the option A, C, D, and E are correct.

Learn more about the factors that go into a project plan.

brainly.com/question/15410378.

a start-up company operates all of its web servers and services on a cloud platform using platform as a service (paas). the company offices run a local domain controller for directory services. which type of attacks would the cloud service provider consider as cloud-based attacks as opposed to on-premise? (select all that apply.)

Answers

Cloud-based attacks are those that occur through the Internet and that are directed against cloud servers or services. This may occur as a result of the attacker's attempt to gain access to sensitive information or to damage or disable the service.

Here are some types of attacks that cloud service providers would consider as cloud-based attacks:

1. Distributed Denial of Service (DDoS) attacks. Cloud-based DDoS attacks are among the most common and can come from various sources. In general, attackers utilize DDoS attacks to overwhelm cloud servers and prevent clients from accessing the services they require.

2. SQL Injection Attacks. A SQL injection attack occurs when an attacker injects malicious code into an online form or database query. As a result, the attacker may gain access to sensitive information such as credit card numbers, passwords, and other critical data.

3. Malware attacks. Malware is software that is installed on a user's device without their knowledge or consent. These programs are used by cybercriminals to obtain sensitive information from the victim's device, including passwords, bank account numbers, and other critical data.

4. Brute Force Attacks. This type of attack involves an attacker trying to gain access to a system by guessing the correct password. The attacker will attempt to use a variety of passwords until they find the correct one.

5. Man-in-the-middle attacks. Man-in-the-middle attacks occur when an attacker intercepts communication between two parties and steals sensitive information such as passwords, credit card numbers, and other critical data.Therefore, DDoS attacks, SQL injection attacks, Malware attacks, Brute Force Attacks, and Man-in-the-middle attacks are considered as cloud-based attacks as opposed to on-premise.

To know more about Cloud-based attacks visit:

https://brainly.com/question/16462984

#SPJ11

What is computer generation ? Discuss different generations of computers
with the technologies used in each generations.​

Answers

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Please help me with this

Answers

Answer:

what

Explanation:

Using matlab, please solve it:
Sorting problem:
6) Find the 3 participants that got the highest scores in test1. Display the result in descending order,
use the following format:
"1. "
"2. "
"3. "

Answers

This will give you the three participants with the highest scores in test 1 displayed in descending order.

To solve the sorting problem using MATLAB and find the three participants with the highest scores in test1, you can follow these steps:
1. Create a matrix or vector containing the scores of all participants in test1.
2. Use the `sort` function in MATLAB to sort the scores in descending order. You can use the command `sorted_scores = sort(scores, 'descend');`, where `scores` is the matrix or vector containing the scores.
3. Take the first three elements from the sorted scores to get the three highest scores. You can use the command `highest_scores = sorted_scores(1:3);`.
4. Display the result in the desired format using the `fprintf` function in MATLAB. You can use the command `fprintf('1. %.2f\n2. %.2f\n3. %.2f\n', highest_scores);`, where `%.2f` is used to format the scores with two decimal places.

Make sure to replace `scores` with the actual matrix or vector containing the scores.

To know more about  MATLAB  refer for:

https://brainly.com/question/30641998

#SPJ11

9-1) Determine the future values of the following present values... a) \( \$ 2,000 \) for ten years at \( 9 \% \) compounded quarterly b) \( \$ 2,000 \) for ten years at \( 9 \% \) compounded daily

Answers

Future Value ≈ \( \$4,645.95 \), Future Value ≈ \( \$4,677.11 \).

To determine the future values, we can use the formula for compound interest:
Future Value = Present Value * (1 + (interest rate / number of compounding periods))^(number of compounding periods * number of years)
a) For \( \$2,000 \) for ten years at \( 9\% \) compounded quarterly:
Future Value = \( \$2,000 \) * (1 + (0.09 / 4))^(4 * 10)
Future Value = \( \$2,000 \) * (1 + 0.0225)^40
Future Value = \( \$2,000 \) * (1.0225)^40
Future Value ≈ \( \$4,645.95 \)

b) For \( \$2,000 \) for ten years at \( 9\% \) compounded daily:
Future Value = \( \$2,000 \) * (1 + (0.09 / 365))^(365 * 10)
Future Value = \( \$2,000 \) * (1 + 0.000246575)^3650
Future Value = \( \$2,000 \) * (1.000246575)^3650
Future Value ≈ \( \$4,677.11 \)

To know more about compound interest refer for :

https://brainly.com/question/3989769

#SPJ11

Maintaining the machine is a non value-added activity.
True or false

Answers

In lean manufacturing, value-added activities are those that directly contribute to creating value for the customer, while non-value-added activities do not. Maintenance of a machine can be considered a value-added activity if it prevents breakdowns, improves efficiency, or ensures quality.


However, it's important to note that not all maintenance activities are value-added. If maintenance is excessive, poorly executed, or does not directly contribute to customer value, it can become a non-value-added activity. For instance, if a machine is over-maintained, meaning it receives more maintenance than necessary or the maintenance is not properly prioritized.

Therefore, whether maintaining a machine is a value-added or non-value-added activity depends on the specific context, the frequency and type of maintenance performed, and the impact it has on customer value, efficiency, and quality. In summary, maintenance can be a value-added activity if it contributes directly to customer value, efficiency, or quality.

To know more about Maintenance visit:

https://brainly.com/question/32165218

#SPJ11

False, Maintaining a machine can be both a value-added and non-value-added activity depending on the context and purpose of maintenance.It is not accurate to categorize all maintenance activities as non-value-added.

In the context of lean manufacturing or process improvement methodologies, non-value-added activities refer to tasks or processes that do not directly contribute to the creation of value for the customer. These activities are considered wasteful and should be minimized or eliminated whenever possible.

While some maintenance activities may fall under the category of non-value-added, such as excessive or unnecessary maintenance that does not directly contribute to the production process, maintenance itself can be a value-added activity in certain situations. Preventive maintenance, for example, aims to proactively maintain equipment to prevent breakdowns and maximize uptime, which directly contributes to operational efficiency and customer satisfaction.

In industries where machine reliability and product quality are crucial, scheduled maintenance, inspections, and repairs can be essential to ensure the smooth operation and optimal performance of equipment. By preventing unplanned downtime, maintaining machine accuracy, and extending equipment lifespan, maintenance activities can enhance productivity, reduce costs, and improve product quality, all of which add value to the overall manufacturing process.

Therefore, it is important to consider the specific context and objectives when determining whether maintenance is a value-added or non-value-added activity.

Learn more about the machine:

https://brainly.com/question/2641982

#SPJ11

How would you modify selection sort to arrange an array of
values in decreasing sequence?

Answers

To modify selection sort to arrange an array of values in decreasing sequence, you would need to make a small change in the swapping step of the algorithm.

The modified version of the selection sort algorithm:

1. Start with the first element of the array as the "current maximum".


2. Iterate through the array from the second element to the last.

3. Compare each element with the current maximum.

4. If the element is greater than the current maximum, update the current maximum to be the element.

5. Once you have iterated through the entire array, swap the current maximum with the first element.

6. Repeat steps 2-5 for the remaining elements of the array, excluding the elements that have already been sorted.

7. Continue this process until the entire array is sorted in decreasing order.

The only change from the regular selection sort is that instead of swapping the current minimum with the first element, you swap the current maximum with the first element. This ensures that the largest element is moved to the beginning of the array during each iteration, resulting in a sorted array in decreasing order.

To know more about algorithm refer to:

https://brainly.com/question/29674035

#SPJ11

Plz plz plz help me quick my brain died a while ago and idk the answer

Answers

Answer:

host server i believe

Explanation:

true or false: stix is an application that has been developed by the community to provide cyber threat information.

Answers

STIX (Structured Threat Information Expression) is a standardized language for describing cyber threat intelligence (CTI). It is an XML-based format that enables organizations to share cyber threat data in a consistent, machine-readable format.

What is the purpose of STIX?

The purpose of STIX is to improve cyber threat intelligence sharing capabilities and enable more efficient automated threat intelligence processing. STIX can provide details on cyber threat actors, their capabilities, and their attack methods, as well as information about targeted assets and the time frame of an attack.STIX is not an application, rather it is a language for expressing and exchanging cyber threat intelligence between different applications or organizations. STIX is an open-source initiative developed by the Mitre Corporation, a nonprofit that operates research and development centers for the federal government.

So, the given statement "stix is an application that has been developed by the community to provide cyber threat information" is false.

To know more about Mitre Corporation visit:

https://brainly.com/question/30746123

#SPJ11

which of the following is true select one: a. the plan for this computer network (to be called arpanet) was presented in october 1967, and in december 1969 the first three-computer network was up and running. b. the plan for this computer network (to be called arpanet) was presented in october 1967, and in december 1969 the first five-computer network was up and running. c. the plan for this computer network (to be called arpanet) was presented in october 1968, and in december 1969 the first four-computer network was up and running. d. the plan for this computer network (to be called arpanet) was presented in october 1967, and in december 1969 the first four-computer network was up and running.

Answers

The correct statement is "The plan for this computer network (to be called ARPANET) was presented in October 1967, and in December 1969 the first three-computer network was up and running."The correct answer is option A.

The Advanced Research Projects Agency Network (ARPANET) was the precursor to the modern internet and was developed by the United States Department of Defense's Advanced Research Projects Agency (ARPA).

The plan for ARPANET was indeed presented in October 1967 by Lawrence Roberts, who was the program manager for the ARPA's Information Processing Techniques Office.

In December 1969, the first ARPANET network became operational. It connected four nodes: the University of California, Los Angeles (UCLA), the Stanford Research Institute (SRI), the University of California, Santa Barbara (UCSB), and the University of Utah.

This initial network was a packet-switched network, meaning that data was divided into packets and transmitted over the network independently before being reassembled at the destination.

However, it's important to note that the correct statement in option a mentions a three-computer network, not a four-computer network. This is because initially, only UCLA, SRI, and UCSB were connected. The University of Utah was added later in 1970, expanding the network to four nodes.

In conclusion, the plan for ARPANET was presented in October 1967, and in December 1969, the first three-computer network, consisting of UCLA, SRI, and UCSB, was up and running.

For more such questions on ARPANET,click on

https://brainly.com/question/14823958

#SPJ8

What is the significance of text selection

Answers

Isn’t Fido’s fichfnridj Sidney is sisntjxi

Answer:

Sorry about the other guy

Explanation:

The importance of text selection is that it makes your document or presentation more interesting or appealing (is what i found on google)

Describe at least five tips for making the copying process
efficient and economical.

Answers


1. Plan ahead: Before starting the copying process, it is important to plan and organize the documents. Grouping them by category or similarity can save time and prevent the need for multiple copies. Also, consider the number of copies needed and prioritize accordingly.

2. Use double-sided printing: Utilizing double-sided printing can significantly reduce the amount of paper used. By printing on both sides, you can cut the paper usage in half, which not only saves costs but also reduces environmental impact. Optimize settings: Adjusting the printing settings can help optimize the process.

3. Utilize digital alternatives: Consider using digital alternatives such as scanning or emailing documents instead of making physical copies. This eliminates the need for printing altogether, saving both time and resources.
Maintain equipment: Regularly maintaining and servicing the copying equipment can ensure efficient and cost-effective operation.

To know more about Utilize visit:

https://brainly.com/question/3206515

#SPJ11

True or False
We all come here because we can't get our answers from google

Answers

Answer: True

Explanation:

Google will not always have the answers to your questions so the next best thing is to ask your peirs and see if they know xD

1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwords on the computer?

2. How does having weak security on your browser represent the weakest link in a network?
These questions are from pltw.

Answers

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

Free association involves writing down one or two key terms to help you remember more key terms.
Please select the best answer from the choices provided
OT
OF

Answers

Answer:

true on ed 2020

Explanation:

Answer:

TRUE THO

Explanation:

given the formula for a compound: what is a chemical name for the compound? (1) 1-butanamine (3) butanamide (2) 1-butanol (4) butanoic acid

Answers

The chemical name for the compound can be determined by analyzing the given formula. Let's break down each option:

This compound consists of a butane chain with an amino group attached to the first carbon atom. The prefix "1-" indicates the position of the amino group. Therefore, the chemical name for this compound is N-butylamine. This compound is a primary alcohol with a butane chain. The prefix "1-" indicates the position of the hydroxyl group, which is attached to the first carbon atom. Therefore, the chemical name for this compound is n-butyl alcohol.

In summary, the chemical names for the compounds are:
N-butylamine
n-butyl alcohol
Remember, it's important to analyze the formula and understand the functional groups present in order to correctly determine the chemical name of a compound.

To know more about compound visit:

https://brainly.com/question/14117795

#SPJ11

How can performance standards be set for production jobs when job analysis information is insufficient? How would you set performance standards for a software developer if you were the chief software developer?

Answers

Performance standards can be set for production jobs even when job analysis information is insufficient by using alternative methods. Here's how you can set performance standards for a software developer if you were the chief software developer:

1. Identify the key responsibilities and tasks of a software developer. This can include coding, debugging, and meeting project deadlines.
2. Research industry benchmarks and standards for software development. These can provide a baseline for measuring performance.
3. Consult with experienced software developers or team leaders to gather insights and best practices.
4. Use objective criteria such as lines of code written, number of bugs fixed, or meeting project milestones to measure performance.
5. Establish clear and measurable goals for the software developer based on the specific requirements of the projects they will be working on.
6. Regularly review and provide feedback on the software developer's work to ensure continuous improvement.
7. Consider implementing performance reviews and evaluations to assess the developer's performance against the established standards.
8. Provide training and support to help the software developer enhance their skills and meet the performance standards.

By following these steps, you can set performance standards for a software developer based on available information and industry best practices. Remember to adjust the standards as needed and provide ongoing feedback and support for continuous improvement.

know more about software development.

https://brainly.com/question/32399921

#SPJ11

Question 3.1 – Strategic Planning Explain the role IT projects play in the strategic management process. Question 3.4 – Identifying Projects Nominate an organisation, preferably an IT organisation (it could be one you have worked for or, one that you are interested in e.g. IBM). What process does that organisation follow when identifying potential projects? Evaluate your selected organisation’s approach. Are any of Mishras and Soota’s (2005) ideas for identifying IT projects incorporated? Discuss. Question 3.10 – Project Portfolios Refer to the case study Do the Math. Describe one example which outlines how companies use portfolio management to help align IT projects with business.

Answers

In the strategic management process, IT projects play a crucial role in helping organizations achieve their long-term goals and objectives. Here's a step-by-step explanation of the role IT projects play.


Strategic Alignment: IT projects are essential for aligning the organization's technology initiatives with its overall strategic direction. These projects are designed to support and enable the strategic objectives set by the organization.

Overall, IT projects play a vital role in the strategic management process by enabling organizations to align their technology initiatives with their long-term goals. Through a systematic approach to identifying potential projects and utilizing portfolio management techniques, organizations can ensure that their IT projects contribute effectively to their strategic objectives.

To know more about strategic visit:

https://brainly.com/question/26960576

#SPJ11

“Charlie is creating a design for an airplane that can carry 1,500 to 3,000 people. What properties should the material for the wings and body have” HELP ME PLS!! THIS IS DUE TODAY AT 11:59 PM!!

Answers

Answer:

500

Explanation:

because planes i dont think can hold that much dude srry if wrong

These general characteristics of metals and their alloys, such as hardness, strength, malleability, ductility, elasticity, toughness, density, brittleness, fusibility, conductivity contraction and expansion, and so forth, are of the utmost importance in aircraft maintenance.

What properties, of material, is used in airplane making?

The materials used in the building of aircraft must be light in weight, have a high specific strength, be heat and fatigue load resistant, be crack and corrosion resistant, and be able to withstand gravity forces when flying.

Aluminum, a sturdy yet lightweight metal, is used to make the majority of modern airplanes. Aluminum was used to construct the first passenger aircraft, the Ford Trimotor, which flew in 1928.

Therefore, A new Boeing 747 is also made of aluminum. Aircraft are occasionally constructed with steel and titanium, among other metals.

Learn more about airplane here:

https://brainly.com/question/17247837

#SPJ2

By default the gradient slider is made up of what?

Answers

ribonucleotides

i took the test

Other Questions
Eddie is reading a novel for English class. Has been read 173 out of 480 pages about what percent of the book has he read [2 pts] What is the ratio of the median weekly earnings of the holder of a high school diploma only to the median weekly earnings of the holder of a bachelor's degree?[2 pts] What is the ratio of the area of the red rectangle to the area of the blue rectangle in graph A? (The scale on the horizontal axis is 1 unit per grid mark.)[2 pts] What is the ratio of the area of the red square to the area of the blue square in graph B? (The scale on the horizontal axis is 1 unit per grid mark.) [2 pts] What is the ratio of the volume of the red cube to the volume of the blue cube in graph C? (The scale on the horizontal axis is 1 unit per grid mark and the bases of the prisms are squares.)[2 pts] Explain which graph is the most misleading and give a mathematical justification for your answer. Southeastern Airlines's daily flight from Atlanta to Charlotte uses a Boeing 737, with all-coach seating for 120 people. In the past, the airline has priced every seat at $136 for the one-way flight. An average of 82 passengers are on each flight. The variable cost of a filled seat is $22. Aysajan Eziz, the new operations manager, has decided to try a yield revenue approach, with seats priced at $82 for early bookings and at $188 for bookings within 1 week of the flight. He estimates that the airline will sell 64 seats at the lower price and 36 at the higher price. Variable cost will not change. Total S contribution in the single price approach is S(enter your response as a whole number) QUESTION 14 If fund managers display superior investment performance, it can then be said that: O the market is not strong-form efficient. O the market is strong-form efficient. O fund managers do not Sam can do 120 jumping jacks in two minutes, how many jumping jacks can he complete in 5 mins.? (plz answer quick) 2 (t+2)distributive Youpurchased a home and obtained a 20-year loan of 437,500 at anannual interest rate of 6.5%. Find the total payment (interest andprinciple) paid on the loan over the 20 years 1.What is the present value of a seven-year $100,000 annuity if the annual opportunity cost is 4%?2.I have $9,000 right now. I need $14,000 at the end of year 4. What interest rate must I receive to turn $9,000 into $14,000?3. If I invest $2,000 at the start of each year every year for the next four years in an account paying 4% annual interest, how much will I receive at the end of 4 years? Private investment goods as measured in GDP are purchased by: a. business firms alone. b. households alone. c. business firms and households. d. business firms, households, and governments. Which of the following taxpayers qualifies for the Earned Income Credit?Allison (28) is filing as a single taxpayer with no dependents. Allison's earned income and adjusted gross income in 2021 was $24,900, all from wages. She had no other income. She is a U.S. citizen, lived in the United States for more than six months, and has a valid social security number that allows her to work. She did not have any foreign income and will not file Form 2555, Foreign Earned Income.Anwar (20) is filing as a single taxpayer with no dependents. Anwar's earned income and adjusted gross income in 2021 was $13,333, all from wages. He had no other income. He is a U.S. citizen, lived in the United States for more than six months, and has a valid social security number that allows him to work. He did not have any foreign income and will not file Form 2555, Foreign Earned Income.Rodney (38) and Serena (39) are married, filing a joint return. Rodneys income from wages was $19,781. Serena's income from wages was $31,564. They had no other income in 2021. Rodney and Serena had their first child, Caleb, in July 2021. All are U.S. citizens, lived in the United States for more than six months, and have valid social security numbers that allow them to work. They did not have any foreign income and will not file Form 2555, Foreign Earned Income.Wallace (40) is filing as a single taxpayer with no dependents. Wallaces earned income and adjusted gross income in 2021 was $22,199, all from wages. He had no other income. Wallace is a U.S. citizen, lived in the United States for more than six months, and has a valid social security number that allows him to work. He did not have any foreign income and will not file Form 2555, Foreign Earned Income. Person A earns $100,000 per year, while person B earns $45,000 per year.Both people own homes in the same city. Which conclusion is most likely truefor these people when they pay their property taxes?O A. Neither person A nor person B will have to pay property tax.O B. Person B will pay at a higher property tax rate than person A.C. Person A will pay at a higher property tax rate than person B.D. The property tax rate will be the same for person A and person B. In the conceptual framework for financial reporting, what provides "the how the implementation of accounting? OA Elements of financial statements. OB. Objective of financial reporting. OC Qualitative characteristics of accounting information. OD. Recognition, measurement, and disclosure concepts such as assumptions, principles, and constraints. L Click Submit to complete this assessment. The first level in the International Accounting Standards Board's (IASB's) Conceptual Framework: COA OB. OC OD. Identifies recognition, measurement, and disclosure concepts used in establishing and applying accounting standards. Identifies the objective of financial reporting. Includes assumptions, principles, and constraints. Provides the elements of financial statements. In het commercial substance, Alpha Cs traded equipment with a cost of $7,700,000 and book value of $2.500.000 and gave $4,420,000 cack. The old machine had a fair value of $1,170.000 Which of the following journal euros would Alpha Co make in red the exchange? OXF Loss on Disposal AFR0000 330,000 Acedated Depriciation 5,200,000 Equipment 1,700,000 4,420,000 Sach 6.590,000 Accumilated Depreciation. 3,5300,000 12.120,000 6,920,000 2.500,000 4,420,000 7,700,000 4,420,000 OBE OC Equipment OD Equipment. Equipment Equipment Cash Accumulated Depreciation.. Equipment Cash 6,590,000 5,530,000 Bob Marby purchased a TV from Tryton Sales and signed a 2 -year, \( 8 \% \) promissory note for \( \$ 1,000 \). What is the amount required to pay off the note if it accrues simple interest over the t The mean of ten numbers is 5. When another number is added the mean is still 5. What is the missing number? which molecule has the highest/largest pka? (your answer may include more than one of the choices if the molecules shown have the same value.) What is Value at Risk (VaR)?a- Value at risk is worst-case scenario.b- VaR depends on statistical distributions, confidence level.It will be different under different statistical assumption for the What impacted the Nara period the most:Buddhism and Shintoismart and literatureagricultural villagesJapanese poetry form called waka Michael wants to invest an inheritance of $26,000 for one year. His credit union offers 5.33% for a one-year term or 5.28% for a six-month term. (a) How much will Michael have after one year if he invests at the one-year rate? (b) How much will Michael have after one year if he invested for six months at a time at 5.28% each time? (c) What would the one-year rate have to be to yield the same amount of interest as the investment described in part (b)? Choose the slope and y-intercept thatcorrespond with the graph.Click on the correct answer Gianna , the new controller of United Manufacturing Company (UMC) believes that the company should use the dual rate method of allocating overhead costs of its Materials Management Department to its Machining and Assembly Departments instead of the single rate method, which the company has used since its inception 20 years ago. Gianna's Materials Management Department has an annual capacity of 7,440 labor-hours and a budgeted fixed cost of $297,600. The budgeted variable cost per labor-hour of the Materials Management Department is $28. Jackson gathers the following information:Machining DepartmentAssembly DepartmentTotalBudgeted usage of Materials1,3504,8506,200Management labor-hours1,0503,9505,000Actual usage of Materials1,2003,6004,800Management labor-hours1.Using the single-rate method, allocate Materials Management Department costs to the Machining and Assembly Departments in these three ways:a.Calculate the budgeted rate based on the budgeted number of Materials Management Department labor-hours and allocate costs based on the budgeted use of Materials Management labor-hours in the Machining and Assembly Departments.b.Calculate the budgeted rate based on the budgeted number of Materials Management Department labor-hours and allocate costs based on actual usage.c.Calculate the budgeted rate based on the practical capacity of Materials Management Department labor-hours and allocate costs based on actual usage.2.Using the dual-rate method, compute the amount allocated to the Machining and Assembly Departments when (a) the budgeted fixed-cost rate is calculated using budgeted fixed costs and practical capacity of the Materials Management Department, (b) fixed costs are allocated based on the budgeted fixed-cost rate and budgeted usage of Materials Management Department services by the Machining and Assembly Departments, and (c) variable costs are allocated using the budgeted variable-cost rate and actual usage.3.Comment on your results in requirements 1 and 2. Discuss the advantages of the dual-rate method.