Which of the following is required before securing the car?
A. Setting the parking brake
B. Stopping the vehicle
C. Placing the gear selector in park (P)
D. Turn off the engine

Answers

Answer 1

What is required before securing the car is C. Placing the gear selector in park (P).

What is a gear selector?

The gear shifter  can be regarded as one that allows the vehicle to be put into different gears on a manual transmission.

When using  an automatic transmission, the gear shifter is referred to as gear selector and it is required, before securing the car and it's normally located between the two front seats of the vehicle.

Learn more about gear selector at;

https://brainly.com/question/26008646

Answer 2

Answer:

stopping the vehicle.

Explanation:


Related Questions

anyone wanna hop on 1v1.lol
party code : usfhb6

Answers

Answer:

thx for the points

Explanation:

I am very bad at Fortnut but very good at overwatch yes

Why is it important for schools and organizations to have an Acceptable Use Policy?
A. It prohibits people from using the Internet.
B. It lets people know what is considered to be acceptable use of the Internet.
C. It makes it mandatory for people to use the Internet.
D. It provides the acceptable use rules for the country.

Answers

A. Is the correct answer I’m pretty sure.

Answer:

B. It lets people know what is considered to be acceptable use of the Internet.

Explanation:

An Acceptable Use Policy (AUP) is a set of guidelines and rules that outline the acceptable and appropriate use of technology, particularly the internet and digital resources, within schools and organizations. The primary purpose of an AUP is to provide clear expectations and guidelines to users regarding the appropriate and responsible use of technology resources. Some of the reasons why it is important for schools and organizations to have an AUP are:

Establishing Boundaries: An AUP helps set clear boundaries and expectations for the use of technology resources. It defines what is considered acceptable and appropriate behavior, ensuring that users understand the rules and guidelines that need to be followed.Promoting Responsible Use: By outlining acceptable use, an AUP encourages responsible and ethical behavior when using technology. It emphasizes the importance of respecting the rights of others, protecting privacy, and adhering to legal and ethical standards.Protecting Users and Systems: An AUP helps protect users and the organization's technology infrastructure. It provides guidelines to prevent the misuse of resources, such as engaging in cyberbullying, accessing inappropriate content, or engaging in illegal activities. By promoting safe and responsible use, an AUP helps maintain a secure and productive technology environment.Educating Users: An AUP serves as an educational tool, informing users about digital citizenship, online safety, and responsible use of technology. It helps users understand the potential risks and consequences of inappropriate or irresponsible behavior, fostering digital literacy and responsible digital citizenship.Legal and Compliance Requirements: Having an AUP ensures that organizations comply with legal obligations and regulatory requirements. It helps protect the organization from potential legal liabilities by setting guidelines for appropriate use and making users aware of their responsibilities.

Overall, an AUP plays a vital role in promoting responsible, safe, and ethical use of technology resources within schools and organizations. It helps create a positive and secure digital environment and ensures that users are aware of the expectations and guidelines for using technology appropriately.



Tech A says that no matter which way the vehicle turns, the inside wheel must always turn less sharply than the outside wheel. Tech B says that the

Ackermann principle angles the steering arms toward the center of the rear axle. Who is correct?


A Tech A


B Tech B

C Both A and B


D Neither A nor B

Answers

D would hxh vigil be correct

The Ackermann level of a vehicle's steering geometry is expressed as a percentage, with 100% Ackermann denoting that the angle of steer difference between the inside and outside tyres exactly matches the geometric low-speed turn center. Ackermann or Anti-Ackermann are rarely used in full force in racing vehicles. Thus, option B is correct.

What Ackermann principle angles the steering arms?

In the picture on the left, the steering arms are slanted inward to provide a way for the wheel angles to change more slowly. This causes the wheels to turn at an uneven angle and is the basis of the Ackerman Steering Principle.

As you turn the wheel, the steering wheel's shaft also revolves. This then rotates the pinion, which is situated on top of the rack. While the tie rod is moved by the rotation of the pinion, the rack moves linearly. The tie rod connected to the steering arm then causes the wheel to revolve.

Therefore, Ackermann principle angles the steering arms toward the centre of the rear axle.

Learn more about Ackermann here:

https://brainly.com/question/29676606

#SPJ5

How could this situation have been de-escalated?
What could the different people involved have done?


Felicia and Jen are friends from school. They both audition for the lead role in the school play. The next day, the drama teacher, Mr. Adler, posts the final cast list, showing that Felicia was selected for the role. Felicia posts a photo of the list on social media with the caption "Guess who made LEAD ROLE!! ME!" Other students at her school see the post and make comments.
The comments continue to come in. People start responding with #teamjen and #teamfelicia hashtags. Later, in response to Jayden's comments, Felicia posts an embarrassing picture of Jayden and calls him out for failing Mr. Adler's class.

Answers

they could have handled the situation better instead of making it the biggest thing ever
Yeah what he said really

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to you? Why or why not?

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to

Answers

Answer:

yes she is a real person she had  a son named Phil and her husband was alexander Hamilton he died in a duel with the vice president Aaron burr

there son died in a duel two so Eliza  was just alone in the world with out her some and husband  she ran a orphanage and saw all of the kids and it reminded her of Alex  

Explanation:

Answer:

yeah shes human i refuse to think shes not

Explanation:

What are some of the current trends in fashion?
For women,____tote bags and high-heeled sandals are popular now. For men, ____colors are the new trend. Bomber jackets and prints are also a fad among ____.

1.oversized
Tattered
Pocket sized

2.muted
Pastel
Bright

3.men
Women
Children

Answers

Answer:

1. pocket sized

2. muted

3. children

Full Paragraph :

For women, pocket sized tote bags and high-heeled sandals are popular now. For men, muted colors are the new trend. Bomber jackets and prints are also a fad among children.

Yeah that's basically the new trends in fashion. =v=  

I think its oversized, bright and men but i may be wrong sorry

While Lucas was shopping online, a new window opened to show similar products from a different store. Which of the following practices will prevent unauthorized access to his system when browsing the internet? (5 points) Enable pop-up blockers. Install antivirus software. Protect passwords. Use spam filters.

Answers

Install antivirus software

To prevent unauthorized access when browsing the internet, Lucas should enable pop-up blockers and install antivirus software.

How can Lucas enhance his online security while browsing?

Enabling pop-up blockers and installing antivirus software are essential steps to enhance Lucas's online security. Pop-up blockers help prevent malicious or unwanted windows from opening unexpectedly, reducing the risk of unauthorized access through deceptive pop-ups.

The antivirus software scans for and detects potential threats, such as malware or viruses, safeguarding Lucas's system from unauthorized intrusions while he explores the web. By employing these measures, Lucas will reduce the chances of unauthorized access to his system during his online shopping activities.

Read more about unauthorized access

brainly.com/question/14925927

#SPJ2

1. How can you help prevent being a target of cyberbullying?

2.What can you do if someone you know is cyberbullying others?

Answers

1. stand up for yourself, keep your socials on private and only accept for your close friends and relatives.

2. screenshot and print out evidence, show to a trusted adult and even you can take legal action.
1. stand up for yourself.

2. tell a trusted adult.

Which of the following options shows the correct code to increase a player’s lives by an amount equal to a variable called hits?

A.
lives == lives + hits

B.
hits == lives + hits

C.
lives = lives + hits

D.
lives + hits = lives

Answers

The answer is C.

The line lives = lives + hits increments a player's lives by an amount equat to hits.

the answer to the problem is C

What are some qualities of a good game critic? What are some qualities of a bad game critic?
Pretend you are a game critic and think of a game you recently played. Identify the game and evaluate your experience of playing it.
How could a game development team use measures of things like blood pressure, brain waves, eye movement, and even electrical conductivity of a player’s skin to improve their game?
What kind of qualities do studio managers look for in curators?
Your friend Ananda has asked you to help train her in how to “debug” her game. In your own words, describe the full three-step process of testing a game, including the practical actions Ananda should be taking along the way.

Answers

Hello! :P
Okay, so we want to answer one question at a time, so the first question. What are some qualities of a good game critic? So that's where we do some thinking. First if we don't know what "game critic" means we need to either look it up or ask someone around us. So, a "game critic" is "a person who reviews video games professionally or as a hobby." To answer the first question I would put........You could give readers or gamer's an overview of the games different elements and provide your personal opinion on how good it is. Now remember, you don't have to use what I put it's just something that (I) would put. Now for the second question. What are some qualities of a bad game critic? Well, the only thing I can think of is when a game designer breaks their own rules as an attempt to challenge other players. Again you don't have to use what I put. Now, for the third question. How could a game development team use measures of things like blood pressure, brain waves, eye movement, and even electrical conductivity of a player's skin to improve their game? The answer to that could be pretty easy unless you are more of a big thinker like me and you want to think more outside the box. My answer, which again you do not have to use......would be........Responses from the somatic nervous system, essentially via electrocardiogram. ( via adding responses through your body in order to add abstract or involuntary actions). Responses from the autonomous nervous system that include blood pressure, heart rate, temperature and stomach pH, among others. Response from the central nervous system obtained via electroencephalogram, which detects brain rates (alpha, theta, SM and MU waves). For the fourth question. What kind of qualities do studio managers look for in curators? I would probably put.......Studio managers look for a good curator that are bold, charismatic, fearless and willing to take risks and make mistakes. For the last question. In your own words, describe the full three step process of testing a game, including the practical actions Ananda should be taking along the way. I truly believe this last question should be something you do on your own, but I will be glad to help you on it if you still need help.
I feel that a good game critic is someone who gives an HONEST opinion I also feel that a BAD game critic is someone who doesn’t give an honest review and lies about their opinions or the game

Please help! -Screenshot-
I am a little unsure about this answer, please let me know if I am correct or if I need to chang it.

Please help! -Screenshot-I am a little unsure about this answer, please let me know if I am correct or

Answers

Answer: you're correct

Explanation:

that's the only one that has privacy and safety in mind;

password-protected sites are important for keeping your account & info safe

your age and appearance is private and personal information

posting photographs of yourself can be unsafe

so B is right

The answer would be B
Hope that helps<3

Carina's computer is turning off without warning. Which of the following steps should she take to troubleshoot the problem?
A: Try several fixes at once.
B: Uninstall the anti-virus software.
C: Check the cable connections.
D: Remove devices.

Answers

C

The reason why it’s c is because maybe a cord is loose which is most likely the reason why it turning off all of a sudden (this has also happened to me in real life so trust me on this)
It is c I know because I did the test and got 100 hope this helped thank you for your time

For each of the following discussion questions, write a response in complete sentences. Your response should be at least one paragraph (5 to 7 sentences). Each discussion response is worth a total of 5 points.

How can the knowledge and skills that you develop as a photographer help you solve problems in other areas, such as your personal life, school work, and so on?

Answers

Photography has given common people the ability to be remembered. Photography democratized making images. Making and distributing images became easier, faster, and less expensive. The details were introduced to the world in 1839, a date generally accepted as the birth year of practical photography.

hope this helps :)

Answer:

Photography has given common people the ability to be remembered. Photography democratized making images. Making and distributing images became easier, faster, and less expensive. The details were introduced to the world in 1839, a date generally accepted as the birth year of practical photography.

Explanation:

A data collection tool was developed to allow a small piece of data to be sent from a website to advertisers to track consumers' shopping and buying habits. This tool is called a:

A.
digital tracer.

B.
data analysis.

C.
cookie.

D.
network.

Answers

Answer:

C. cookie.

Explanation:

The data collection tool that allows a small piece of data to be sent from a website to advertisers to track consumers' shopping and buying habits is called a "cookie".

The answer is cookie

can someone plz help me with this question plz

Question:
what does 64-bit mean? Explain in your own words.​

Answers

Answer:

64-bit integers, memory addresses, and other data units are all 64 bits wide in computer architecture. Furthermore, architectures based on 64-bit central processing units and arithmetic logic units are those that use processor registers, address buses, or data buses of that size.

Explanation:

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide. Also, 64-bit central processing unit and arithmetic logic unit architectures are those that are based on processor registers, address buses, or data buses of that size
can someone plz help me with this question plzQuestion: what does 64-bit mean? Explain in your own words.

WHAT IS THE DIFFERENCE BETWEEN COMPUTER HARDWARE AND SOFTWARE?IF YOU KNOW THE DIFFERENCE GIVE ME EXAMPLES OF BOTH

Answers

Hardware is further divided into four main categories: Input Devices Output Devices Secondary Storage Devices Internal Components

Software is further divided into two main categories: Application Software System Software

Answer:

the hardware is the motherboard or the wires in the computer. software is how the computer is programmed

Sample program for Do While loop

Qbasic

Answers

Answer:

A "Do While" loop statement runs while a logical expression is true.

Explanation:

This means that as long as your expression stays true, your program will keep on running. Once the expression is false, your program stops running. A "Do Until" loop statement runs until a logical statement is true.

Answer:

A "Do While" loop statement runs while a logical expression is true. Explanation:

A 20-megapixel camera would be the best choice for which type of photograph?

Answers

Large sign or billboard
I personally would choose Billboard

Are they going to make season two of Midori Days

Answers

Answer: Probably not
Explanation-

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

What is your prediction for the future of the internet in the next 20 years?

Answers

Answer:

The future of the Internet over the next two decades and beyond is most likely to see a whole new hyperconnected world of networked people, objects, and systems capable of transforming, reframing, and undermining the established norms of business and society.

My prediction of the future is that technology will keep having an increase of advancement leading to more achievements and discoveries of different areas of life

PLS HELP I GOT 30 MINS TO TURN THIS IN!!!
Discuss a technology that you could never live without in your life. Is the technology a television, video gaming system, or is it a phone? Detail your obsession with this technology and write about a week in which you lived without your technology.

Answers

Answer:
Phone, could be used to save my life when I’m in danger or maybe in trouble.
I think my phone is the technology I couldn’t live without. I use my phone to text and call my friends and if I didn’t have my phone I would have to send letters and that usually takes a week. I also use my phone for emergencies. I couldn’t send a letter to my parents if I got lost in the store or kidnapped.
When me and my family went on a vacation for a week my mom said we have to have a no tech week and I was all “Mom I can’t do that!” So the week went on and I didn’t have any tech and it drove me crazy but I managed.

Which is the best approach to debugging?

A.
Don’t worry about it at all until after the program is written.

B.
Be sure the program will work perfectly before writing it.

C.
Anticipate errors before they happen, and find and fix errors that happen.

D.
Use an HTML encoder.

Answers

C this makes the most sense
C sounds like the best approach.

Write a Python program that makes a turtle draw the shape below, which consists of 8 squares in a row:

Answers

Answer:

import turtle

window = turtle.Screen()

turtle.speed(0)

turtle.pensize(5)

def draw_square():

   times_drawn = 0

   

   # position on the 'x' access.

   x = -350

   

   # while the amount of times drawn is less than or equal to 8 the square gets drawn.

   while times_drawn <= 8:

       

       # increases the 'x' value by 75.

       x += 75

       times_drawn += 1

       turtle.penup()

       turtle.goto(x, 0)

       turtle.pendown()

       turtle.color("black")

       

       # for loop that draws the square.

       for i in range(4):

           turtle.forward(50)

           turtle.left(90)

       turtle.penup()

draw_square()

turtle.done()

Explanation:

Quick, answer this please! What happens if you answer bot questions with low points? Like they say they would give you 10+ points but they only have 5 points? I am afraid I might get h a c k e d

Answers

Answer:

Hello! I haven't been h a c k e d yet so I'm pretty sure its safe.

Explanation:

Okay okay I just got the phone call from you

The page that appears when you first open your Internet browser is the _____.

Answers

Answer:

Home page

I think this is straight forward

The answer to this question is the home page..its kinda obvious

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

I NEED HELP!!!!!!!!!

I NEED HELP!!!!!!!!!

Answers

2nd: Look up the shelf where the book belongs

3rd: Move to the shelf where the book belongs

4th: Place the book on the shelf

Answer:

2nd Step is to -  Look up the shelf where the book belongs

3rd Step is to - Move to the shelf where the book belongs

4th Step is to - Place the book on the shelf

helppppppppppppppppppppppppppp

helppppppppppppppppppppppppppp

Answers

Answer:

2.

Explanation:

Stayed a safe distance away from the tank while shooting to ensure that he did not fall in accidently

im going to go with 1 or 2

Explanation:

Other Questions
If the frostbitten area is to be rewarmed and medical help is more than two hours away, use: PLEASE HELP I WILL GIVE 50 POINTS! IF YOU GIVE FAKE ANSWER I WILL REPORT YOU!!!The amount of money in an account may increase due to rising stock prices and decrease due to falling stock prices. Marco is studying the change in the amount of money in two accounts, A and B, over time.The amount f(x), in dollars, in account A after x years is represented by the function below:f(x) = 10,125(1.83)xPart A: Is the amount of money in account A increasing or decreasing and by what percentage per year? Justify your answer. (5 points)Part B: The table below shows the amount g(r), in dollars, of money in account B after r years:r (number of years) 1 2 3 4g(r) (amount in dollars) 9,638 18,794.10 36,648.50 71,464.58Which account recorded a greater percentage change in amount of money over the previous year? Justify your answer. (5 points) based on your response to question number one and though the interpretation of the illustration, which statement describes how john mitchell and samuel gompers contributed to unionism during the labor movement? you purify some dna and check its concentration and purity by looking at its absorbance at 260nm and 280nm. if the absorbances of your sample are as follows: absorbance at 260nm f(x) is not 0 for x not equal to 03. (10 points) Suppose f: R R is continuous and f(0) = 0. Consider the limit lim yf(x) (x,y) = (0,0) y2 + f(x)2 Does this exist for all such f, not exist for any such f, or exist for some such f? Expl Find the area of the figure. Sides meet at right angles. No links please What authority was given to the postmaster general under the Espionage and Sedition Acts? Jesus began His public ministry at the age of: 35 40 20 30 True or False: Boudinot's piece from the Cherokee Phoenix states that a purpose of the newspaper is to discuss Georgia and U.S. politics. when restoring a volume with data deduplication, which type of volume restores can be used? (choose all that apply.) Explain some of the opinions on women being on bicycles back then. fob destination refers to a situation where title to goods while in transit belongs to the ________. group of answer choices Which of the following models a synthesis reaction? Organisms use different sources of carbon and energy. Archaeans do NOT use glycolysis and do NOT always use the pentose phosphate pathway, but use variations on these pathways for similar purposes. What is the best classification of this type of catabolism 6. Determine if the function y = sin(x) is concave up when x = 10 radians? Show your work. (3 marks) one way that secondary school counselors can combat misconceptions about their effectiveness and involvement is to What does this mean?? Prove that the set {2,4,6,8,10,... } is countable. If a countrys total fertility rate is measured at one, what does this number most likely indicate about the countries population? A. The countrys population is aging.B. The countries population is growing.C. The countries birth rate is far higher than the countries death rateD. The countries population is becoming younger on average. What is the approximate volume of the cylinder?