Plz help asap
I'm giving 20 points to whoever answers it right

Plz Help Asap I'm Giving 20 Points To Whoever Answers It Right

Answers

Answer 1

Answer:

A pneumatic system is a system that uses compressed air to transmit and control energy. Pneumatic systems are used extensively in various industries. Most pneumatic systems rely on a constant supply of compressed air to make them work. This is provided by an air compressor.

A hydraulic system is a drive technology where a fluid is used to move the energy from e.g. an electric motor to an actuator, such as a hydraulic cylinder. The fluid is theoretically uncompressible and the fluid path can be flexible in the same way as an electric cable.

Explanation:

Examples of pneumatic systems and components Air brakes on buses and trucks. Air brakes on trains. Air compressors. Air engines for pneumatically powered vehicles. Barostat systems used in Neurogastroenterology and for researching electricity. Cable jetting, a way to install cables in ducts. Dental drill.

Hydraulic systems use the pump to push hydraulic fluid through the system to create fluid power. The fluid passes through the valves and flows to the cylinder where the hydraulic energy converts back into mechanical energy. The valves help to direct the flow of the liquid and relieve pressure when needed.

Related Questions

what is computer memory measured in​

Answers

Answer:

MB I think I learned it actually.

Explanation:

define file in context of computer programming​

Answers

a file is a computer resource that stores data, info, settings or commands discreetly in a computer storage device. a file may be written to display icons, a written message, or a computer program and other kinds of data.

the best answer it requests services, data and other resources available on the server​

Answers

Answer:

Explanation:

?

write 3 things that can't be done without technology.

Answers

Answer:

Hacking Online Orders Math

Explanation:

1.Shopping 2.Talk long distance. 3.Watch a movie

Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to upload this picture wothout the mirrored effect.
To correct the mirroring text, Philip can (flip, crop, distort) the picture (vertically, horizontal, diagonally).

Answers

Answer: flip the picture vertically

Explanation: horizontally would make it upsidedown. And diagonally isn’t right either.

What is the HTML code symbol to the !nstagram Facts Part 2?

FIRST ONE GETS BRAINEST!!

Answers

¶^↑↓→← html code symbol

1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this statement? Provide evidence to support your position, (2 points)​

Answers

Answer:

true

Explanation:

everything is computerized. banks, shopping, financial business records, ect

write 3 things that can't be done without technology. write your opinion?

Answers

Answer: Call a theater to get movie times, Use a phone book to find a company to do work around your house, and Park your used car on the street with a sign that says it’s for sale.

Explanation: my opinion is that it's fine to do each of those things without technology. Because technology is supposed to help the limited capacity of the human brain and improve things that make every day life quicker, easier, leaves more time to do something else.

Answer:

1) Filming, depending on the camera it is still technology that everyone uses on a daily bases with no hesitation for use.

2) Vehicles, I'm not sure if they are a type of technology but for this case lets just say they are. With vehicles we can get to places much faster then walking or taking a carriage.

3)Records, in this case music. Without records or anything of the sort we wouldn't exactly be able to listen to our favorite music at all times.


8. (a) Identify two advantages and four limitations of the Speech recognition devices.

Answers

Explanation:

Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it

Here is the API for a robot library.
// moves the robot forward
function moveForward();

// turns the robot to the left
function rotateLeft();

// turns the robot to the right
function rotateRight();

// checks if a robot can move in any direction
// direction {string} - the direction to be checked
// return {Boolean} - true if the robot can move in that direction, otherwise returns false
function canMove(direction);
Which code segment will guarantee that the robot makes it to the gray square without hitting a wall or a barrier (black square)?



A.
B.
C.
D.

Answers

Answer:

hi

Explanation:

What is the pencil tool in photoshop

Answers

Answer:

I think its to draw on the photo.

Explanation:

Answer:

draw

Explanation:

it opens the drawing menu

3.Choose the correct container for sugar
A:bag of sugar
B:Can of sugar​

Answers

Answer:

bag of sugarrrrrrrrrrr

Answer:

The answer is A. bag of sugar

In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. What happens if any transaction data is changed or modified in the earlier existing blocks?

Answers

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

How do you think electronic spreadsheets have transformed businesses today?​

Answers

this is kinda your opinion but many other people are using it whether it is to stay organized at school or work and some people use it for outside of school or work

Fill in the blank with the correct response. Wanting to become a better archer is a what?

Answers

Is a better archer shooter

How is this a SyntaxError?(python3)

Answers

Answer:

1 bracket, instead of 2 is closed in line 9

Explanation:

Given

The attached code

Required

Why is line 10 a syntax error?

The error points to line 10.

From the attached code, the line 9 is:

amount = int(input("Enter cheese order weight: ")

When converting an input to integer, the syntax is:

variable = int(input("Prompt"))

But, only 1 bracket is closed in the program, where 2 is required.

This is definitely a syntax error

Answer: theres only one bracket

Explanation: got it right on edgen

A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos being played more times than can be represented with 32 bits, the website is planning to change to 64-bit integers for the counter. which of the following best describes the result of using 64-bit integers instead of 32-bit integers? a. 2 times as many values can be represented. 32 times as many values can be represented. 2^32 times as many values can be represented. 32^2 times as many values can be represented. I know the answer is 2^32 but can someone explain it to me?

Answers

Answer:

2³² times as many values that can be represented

Explanation:

A 64 bit register can hold 2⁶⁴ different values, while a 32 bit register can hold 2³² different addresses

Therefore, a 64 bit can represent 2⁶⁴ ÷ 2³² = 2³² times as many values as can be represented by 32-bit

Therefore, the 64 bit can represent 2³² times as many values that can be represented by a 32 bit integer

Give 3 features and uses of
Desktop
laptop
palmtop computer

Answers

Answer:

A Palmtop or hand-held personal computer is small enough to hold in one hand and operate with the other. Also called a handtop, these ultra-small computers may have specialized keyboards or keypads for data entry applications or have small qwerty keyboards.

• Palmtops are also called PDAs, hand-held computers and pocket computers.

• Palmtop or hand-held personal computer, lightweight, small, battery-powered, general-purpose programmable computer. It typically has a miniaturized full-function, typewriter like keyboard for input and a small, full color, liquid-crystal display for output. In addition to an operating system that is compatible with that of a desktop computer, a palmtop will typically contain a word processor, a spreadsheet program, and a calendar and phone book. A variety of other programs can be loaded and executed, and data can usually be transferred to and from a desktop computer. Although some palmtops are like personal digital assistants in that they accept handwritten or touch screen input, they generally differ in that the palmtop has more memory, a keyboard, and a greater variety of available programs.

Explanation:

Which option is a means of reporting events via the Internet? O A. Taking photos to upload O B. Browsing for fun O C. Downloading music videos D. Searching with search engines​

Answers

Answer:

your answer is A!

Explanation:

photos are often a great form of proof or example material when reporting something over the web!

while
norma
mean
cinta
to the user
a.) Define the term microcomputers.​

Answers

Explanation:

Microcomputers are computers designed around a microprocessor, smaller than a minicomputers or a mainframes.

Hope it will help :)❤

Will this website ever get itself together to stop people from sending links?

Answers

Answer:

no

Explanation:

When you insert a copy of Excel data into a Word document the data is __________ in the Word document

Answers

Answer:

I don't know if I get a chance to get through

___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Answers

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

If an application holds more data than what it was designed to hold, which incident can occur?

Answers

Answer: I think the best answer is B.

Explanation:

I am not complely sure, sorry.

Hope it helps though!!

HOW CAN YOU GET THE COOLEST FONTS ON GOGGLE SLIDES???

Hint: Im looking for like bubble letters or like stuff to like install for goggle slides, now mind u i do have a/am using a Chromebook so ya

Answers

i would love to help. but if you could text my number i could help more. i have a chromebook

Answer:

mhmm. you can go to www.bubbleimages.com

Explanation:

A cola container is in the shape of a right cylinder. The radius of the base is 4 centimeters, and the height is 12 centimeters. What is the volume of the container? A. B. C. D.

Answers

Answer:

Volume of cylinder = 603.42 cm² (Approx.)

Explanation:

Given:

Radius r = 4 cm

Height = 12 cm

Find:

Volume of cylinder

Computation:

Volume of cylinder = πr²h

Volume of cylinder = (22/7)(4)²(12)

Volume of cylinder = 603.42 cm² (Approx.)

Answer:

It is B, also know as 192π cm3

Explanation:

Activity in September 2014, the Federal Bureau of Investigation (FBI) announced that is next generation Idenufication system was fully functional The FBI named it the integrated Automated Fingerprint Identification system (IAFIS), Conduct online research on this system and answer the following questions 1. Which elements can be stored in IAFIS? 2. What is the response time of this system? 1. How has this system benefited the FBI​

Answers

Answer:

(Answers may vary.)

In addition to fingerprints, IAFIS stores criminal histories, mug shots, and physical information like scars, tattoos, eye color, hair color, weight, and height. It also stores fingerprints of individuals who are or were employed by the US military and the federal government.

The system’s average response time for criminal fingerprint processing is about 27 minutes. Civil fingerprint processing takes over an hour.

Previously, the tenprint submission and identification was a manual, tedious process. It took the FBI weeks or months to process a single fingerprint submission. IAFIS has automated this process and added advanced identification capabilities. The submission and processing takes just few minutes. This has helped the FBI solve and prevent crime and tighten holds on criminals and terrorists.

Explanation:

you must regularly do this on your computer to prevent a virus from infecting it​

Answers

Answer; Install Anti-Virus/Malware Software. ...

Keep Your Anti-Virus Software Up to Date. ...

Run Regularly Scheduled Scans with Your Anti-Virus Software. ...

Keep Your Operating System Current. ...

Secure Your Network. ...

Think Before You Click.

Explanation:

i took the test

Answer:

Clean out unneeded folders, scan your pc with an anti virus, use a vpn, and download from trusted websites

Explanation:

Consider the following code:
x = "apple"
y = x
z = "banana"
print(x + " " + y + "\n" + 2)

Answers

Answer:

apple apple

banana

Explanation:

Given - Consider the following code:

x = "apple"

y = x

z = "banana"

To find - print(x + " " + y + "\n" + z)

It will print -

apple apple

banana

First will apple followed by '' '' that is space then y which is equal to x that is apple then followed by ''\n'' new line then banana.

So, The answer would be

apple apple

banana

Notation used -

'' '' represents space between two values

''\n'' represents new line

Would be easier to divide/fold a rectangular sheet of paper into 22 equal pieces or 24 equal pieces? Explain your answer. Please help !!!!!

Answers

Answer:

24 equal.

Explanation:

Other Questions
What should I put for x in the box? first to answer is brainliest I need help on Part C!! PLEASE!The Barker family just left the local pet store with Lucky, their new family dog. The pet store owner told the Barker family that for the next 6 months, Lucky would grow at an average rate of 9 pounds per month. Currently, Lucky is 2 months old and weighs 3 pounds. Part A: Complete the given table that represents Lucky's current weight, in pounds, as a function of his age, in months.Part B: Graph the data in the table from Part A. Be sure to label the graph and all data points.Part C: Create a linear model that represents the Lucky's current weight, in pounds, as a function of his age, in months.Part D: If Lucky continues to grow at the rate of 9 pounds per month beyond the expected six months, how much will Lucky weigh by the time he is one year old? hii please help ill give brainliest!! im giving all my points away Mr. Linx and Mrs. Lynn both work for the same company, but they do not have the the same hourly wages. Together they make $32.50 per hour. This week, Mr. Linx (x) worked 35 hours, and Mrs. Lynn (y) worked 37 hours. Together, they made $1,172.50. Find the missing number.19582 = 19000 +_+3 Which function is shown in the graph below? PLEASE HELP ASAP!!! Subject Photography:Midday light tends to wash out colors in the photograph, making them duller and lighter.True or False I need help pls!!!!!!!!!!!!! A murder occurs in a nursing home during a night full of thunderstorms and pouring rain. The victim is discovered lying on the plush carpet of the rec room, bleeding from a wound to the head. The staff assures investigators that there must have been a break-in because no one who lived or worked at the facility would do something like that. Considering the Principles of Trace Evidence, what would investigators be looking for to prove that someone entered from outside the facility? Muddy or wet footprints in the carpet The discovery of a murder weapon Letters to the victim from a sick relative Blood spatter from the victim's head wound let: f(x)=x+1 and g(x)=x^2-2 find: g(x) - f(x) Con las conquistas de Mxico y Per, Espaa obtuvo el control de un enorme imperio en las Amricas. Para gobernar sus posesiones americanas, el rey espaol eligi a funcionarios, cada uno de los cuales gobernaba una gran rea en nombre del rey. Cmo se llamaban estos funcionarios? (NO CONQUISTADOR)With the conquests of Mexico and Peru, Spain gained control of a huge empire in the Americas. To rule his American possessions, the Spanish king elected officials, each of whom ruled a large area on behalf of the king. What were these officials' names? (NON-CONQUEROR) -plzzzzz help ASAP !!!! 10. An automobile headlight has a resistance of 40 ohms when attached to a standard 12 volt battery. How much current flows through the headlight? The height of an object thrown into the air can be modeled bythe h(t) = -16t^2 + 70t + 95, where h(t) is in feet after t seconds.What is the height of the object after 3 seconds?A) 161 feetC) 70 feetB) 45 feetd) 171.56 feet The Game-The Game is a mental game where the objective is to avoid thinking about The Game itself. Thinking about The Game constitutes a loss, which must be announced each time it occurs. It is impossible to win most versions of The Game. Depending on the variation of The Game, the whole world, or all those aware of the game, are playing it all the time. Tactics have been developed to increase the number of people aware of The Game and thereby increase the number of losses. How does the muscular system interact with the digestive system?A Food is moved through the small intestine.B Oxygen is moved into and out of the lungs.C Saliva production increases at the sight or smell of food.D Nutrients are absorbed and transported to other body parts. QUICK PLZ HELP RN ASAP Change 12.39% to a decimal Help with this pls if you dont know the answer please dont answer