Answer: Robert H. Goddard
Explanation: he developed and flew the first liquid-propellant rocket
Answer:
-Technical Societies
Explanation:
Rocket enthusiasts and rocket clubs were active in Germany, the US, Russia, and other countries. Experimental rockets were designed, tested, and sometimes flown. Some of the experiments used liquid fuel, though solid-fuel rockets were also developed. In 1932, the rocket motor was developed as a reusable method for the flight of a rocket.
what is two features of the minicomputer?
Answer:
It is smaller in size than a mainframe computer. It is less expensive than a super and mainframe computer. It is not much more powerful than the mainframe and supercomputer, but powerful than microcomputers. It supports multiprocessing and multi-tasking.
Explanation:
Need answer quick plz.
Fill in the blank with the correct response.
A colleague excitedly tells you she has created a interface component for SPSS, a statistics software program. She
has created a
Answer:
SPSS
IS THE ANSWER
IHOPEIT WILL HELP YOU
Answer:
wassup with it bro i don't even know the answer and i just want the points
Explanation:
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device
Answer:
The answer is "Use SCP to back up the router configuration to a remote location".
Explanation:
In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.
What is considered appropriate dress for men and women in the workplace? Select all that apply.
Answer:
I guess clean, pressured pants or skirt
and
dress shirts and ties
Answer:
the first and last
Explanation:
because you don't want to reveal any things that are inappropriate but you still want to be comfortarible.
Predict the future that social media will have on society or the environment.
Answer:
Social networks are becoming more and more popular. More than 80% of the 4.66 billion people on the planet with access to the internet are social network users… and this share is expected to grow!
Society will drift to technology and rely on it more.
Environment wouldn't be taken cared of, and may be damaged.
Explanation:
Answer:
The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.
Explanation:
The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.
two ways in which some culter views that exist may affect a relationship negatively
Answer:
some people say different culture less they get along
Explanation: or more
who plays oblox .............................
Answer:
Me
Explanation:
A citation and its ____________________ can be entered at the same time. [Insert Citations]
Question 4 options:
name
date
source
table of contents
Answer: source
Explanation:
A citation and its source can be entered at the same time. Hence option c is correct.
What is citation?Citation is defined as how you disclose to your readers that a particular passage in your work was taken from another source. Identifying the sources you used to obtain your knowledge can demonstrate to the reader that you did thorough investigation. to recognize and respect other scholars' work by giving them due credit.
Select the phrase or sentence you wish to cite by clicking at the end of it, and then select Insert Citations from the Citations & Bibliography group on the References tab. Choose the citation you want to use from the list provided under "Insert Citation."
Thus, a citation and its source can be entered at the same time. Hence option c is correct.
To learn more about citation, refer to the link below:
https://brainly.com/question/1272936
#SPJ2
Display the IP address of the default gateway of this device.
Answer:
ipconfig
Explanation:
Type ipconfig and look for a Default Gateway entry that is not blank.
Which of the following algorithmic efficiencies would be considered LEAST efficient?
A. Linear
B. Constant
C. Polynomial
D. Exponential
Answer:exponential
Explanation: I believe
why auto-updates can reduce the risk of a cyberattack?
Answer:
They help keep your software up to date.
Explanation:
Using Windows for example: With automatic updates, you don't have to search for updates online or worry about missing critical fixes or device drivers for your PC.
You can read more about it here: https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
I hope this helps you!
QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?
1 2
3 4
Question #4
Multiple Choice
Which statement is true about the random and secrets modules?
O Only the secrets module can generate random numbers.
O Both modules can generate random numbers.
Neither module can generate random numbers.
O Only the random module can generate random numbers.
Answer:
Both modules can generate random numbers.
Explanation:
Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.
Answer:
Neither module can generate random numbers.
Explanation:
Because I took the quiz and that's the right answer.
How do you open an application on the macOS?
Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.
Answer:
you can simply click on 'application' in the sidebar to open your default application folder, which contain for each app on your system.you can double click any of the icons in here to open them or take you to do it if currently open.
write Python statement to do the following tasks (a) create a list that contain the name of 5 student of your class (b) add one more name to the list of 5 students (c)
delete the first name from the list of student
Answer:
classroster = ["Bill", "Tyler", "Jake", "Sam", "Joe"]
print("Original Roster: " + str(classroster))
classroster.append("June")
print("Added student: " + str(classroster))
classroster.pop(0)
print("Removed the first student" + str(classroster))
Explanation:
We create a variable named classroster and assign it a list value by using []
We print text with the value of the variable classroster, but we used the str tag to make it a string value
We used classroster.append to add "June" to the end of the list.
We then print the classroster again
We use classroster.pop(0) to remove "Bill" on the list. If we wanted to remove "Tyler" from the list, we would use classroster.pop(1).
If we wanted to remove "Jake" we would use classroster.pop(2)
and so on. goodluck!
The ________________________ option allows one to start a numbered list on any number desired. [Set Starting Number Values]
Question 7 options:
Number Formats
Change List Level
Define New Number Format
Set Numbering Value
Answer:
Set Numbering Value.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;
I. View Mode.
II. Print Mode.
III. Drift Layout.
A numbered list can be defined as a list of items that are ordered numerically or sorted sequentially.
Basically, it is best suited for steps or procedures that are to be done sequentially or in order i.e in an ascending order. Thus, a numbered list is an ordered list that starts from 1.
The Set Numbering Value option allows one to start a numbered list on any number desired. To automatically create a numbered list in Microsoft Word, you should press 1 followed by a period, leave a space, type a text and then press the enter button.
Where do you enter characters for a simple search?
Choose the answer.
Navigation Pane
Replace dialog box
Clipboard
Find Pane
Describe white blood cells you see at 10X?
Answer:
White blood cells are part of the body's immune system. They help the body fight infection and other diseases. Types of white blood cells are granulocytes (neutrophils, eosinophils, and basophils), monocytes, and lymphocytes (T cells and B cells). ... Also called leukocyte and WBC.
Explanation:
What is the solution to the equation ?
Which comparison operator means ‘is not equal to’?
!=
==
=#
%
Answer:
A. !=
Explanation:
== Means equal, != is like a block of that, meaning NOT EQUAL
As per the operators, the comparison operator that means 'is not equal to' is !=.
The comparison operator!= is used to detect whether two values are not equal. It is often used to assess conditions in programming languages and logical expressions.
When used, the operator determines if the values on each side of it are not equal. The expression evaluates to true if they are not equal.
This operator is useful for comparing data and executing various code blocks based on their inequality.
Thus, programmers may use the!= operator to generate branching logic and make decisions depending on the equality or inequality of values, increasing the flexibility and control of their program.
For more details regarding operators, visit:
https://brainly.com/question/29949119
#SPJ6
Write a while loop that produces the following output:
1
2
4
8
please i need help
Answer:
Explanation is being shown in the file to the link
Question # 1
Dropdown
Choose the word that matches each definition.
[ ] is the study of designing and building computers and computer-based systems.
Answer:
Computer engineering
Explanation:
Computer engineering is the answer