If a pilot is converting standard time to UTC time and is given the time 1730 UTC, what would EST be?

Answers

Answer 1

The answer is 12:30 hours

Coordinated Universal Time which is abbreviated as (UTC) is a successor to the Greenwich Meridian Time. Offset, UTC is zero hours ahead of GMT and is universally used. It regulates clocks and time. EST (Eastern Standard Time) is minus 5 hours from UTC. Thus, 17:30 in EST will be 12:30 hours






Answer 2

Answer:

4:30PM

Explanation:

I believe this because I think pilots use military time if I'm not to be mistaken...


Related Questions

What type of rock is formed from other rocks being subjected to great heat and pressure?
A: Both igneous and sedimentary
B: Metamorphic
C: Igneous
D: Sedimentary

Answers

Hi,

I believe the best answer would be B, Metaphoric. 

And also, just for future reference, you might want to put questions like this in the "Science" category. I guarantee it will be answered faster, and by users who specialize in that particular subject.☺

~Elisabeth

When creating an HTML document, you would use the tag:

Question 1 options:


<HTML>

<HEAD>

<body>

</html/>









/>

Answers

HTML> : is usually the beginning syntax of the html document
<HEAD>: head defines the meta information for the html document, used to define css to include, javascript to include
<body>: contains main elements and design tags such as p, div etc 
</html/>: </html> is the closing element of an html document but </html/> is not valid.
Hence all of them are used except the last one.

List the correct order of steps necessary to using usmt to migrate files from an old computer to a new computer.

Answers

The USMT (User State Migration Tool) is designed to assist IT professional migrate files to the windows OS. An example is a step by step migration of files and settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have used LoadState a ScanState to complete this end to end migration. The correct order is as follows;


1.      Gather Data Using the ScanState Tool

a)      Install USMT

b)      Run ScanState to Create a Migration Store on the Server

2.       Install Windows

a)      Install Applications

3.       Apply Data Using the LoadState Tool

a)      Install the USMT

b)      Run LoadState






The ___ is the core of the operating system that is loaded into memory when the system boots up. it is responsible for controlling security, managing the file system, and providing a platform for applications to run on. the user rarely interacts directly with this part of the operating system.

Answers

I think the system unit

Positioning images in a document will move the object as text is added.
a. True
b. False

Answers

if you move the image over the words or the letters than yes the words will fit around the picture.

Which of the following is NOT a fixed expense?

A. Rental payment
B. Movie tickets
C. Cell phone bill
D. Internet service

Answers

Movie tickets because you might not go to the same amount of movies every month

A DTP firm has published and printed flyers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm?
A.)body
B.)credits
C.)navigation
D.)title

Answers

Answer:

Just say credits.

Explanation:

.

How does an internet content filter stop traffic based on the fact that it contains the word 'drugs'?
a. malware inspection
b. text filtering
c. content inspection
d. url filtering?

Answers

Hello

The best answer is C

Have a nice day

Adobe indesign is an example of ________ software.

Answers

the answer is desktop publishing.

What element will you include to present numerical data visually on a slide?

Answers

Hi!

The correct elements you would use is a Graph or Chart of some kind. This could mean a simple bar graph or a pie chart.

Answer: Charts, Graphs, and Diagrams.

When presenting numerical data on its own, it may overwhelm your audience. The use of Charts, Graphs, and Diagrams WILL definitely make it more understandable and less overwhelming to your audience. The use of these also make it easier to understand the overall output of your findings.

With the help of these visuals, the presentation will also make the presentation more pleasing. A presentation containing only numerical data will disengage your audience as there will be too much information presented to them.  

Terry is building a web site and wants to have three main links called home, product info, and contact us. she will create a hierarchy of page elements and revise the styles sheets. terry has decided to display the text of all h1 headings found within the page header in green. the style rule applied is _____.

Answers

Final answer:

To style the <h1> headings in the page header in green, Terry would apply a CSS rule similar to 'header h1 { color: green; }'.

Explanation:

Terry is in the process of creating a website and has decided to apply a specific style rule to her site. The rule she wants to apply will make all <h1> headings within the page header appear in green. This can be done by targeting the <h1> elements within the header element in her Cascading Style Sheets (CSS). The style rule will look similar to this:

header h1 { color: green; }

This CSS rule will select all <h1> elements that are children of the header element and apply the color green to them. Using this rule, Terry will be able to clearly highlight her main headings in a distinct color, which can help increase both the usability and aesthetic appeal of the site. Headings, such as home, product info, and contact us, will stand out on the page and align with her design hierarchy.

The main reason to set a field size in access is to:

Answers

The main reason to set a field size in access is to limit the lengths of value in the table.
Field size determines the limits or determines the maximum of text that can be input in the text or number field. Also, it may reduce data entry errors in changing the field size in access.

A type of specialty processor devoted exclusively to protecting your privacy.

Answers

 Cryptoprocessor would be it.

You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on the design folder that apply when files are accessed both locally and remotely. what should you do?

Answers

make sure the file system is working, for example try putting a file into it, make sure to left click and press public 

Commands are organized into tabs on the

A. Ribbon.
B. Status bar.
C. Quick Access toolbar.
D. ruler.

Answers

Answer:

a

Explanation:

What are the three primary components of an Inbox?

Answers

Three Primary Components of an Inbox:( 8 Components of an effective Email.).

Answer: 

1: From Label

2: Subject Line

3: Pre- Header

4: Content

5: Call to action

6: Images'

7: Social Media Buttons

8. Unsubscribe Option

Answer:

C- the message header, the Folder Pane, and the Reading Pane

Explanation:

A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to the internet. the laptop is 8.7 m from the router, and is downloading text and images from the internet at an average rate of 252 mbps, or 252 megabits per second. (a bit, or binary digit, is the smallest unit of digital information.) on average, how many bits are downloaded to the laptop in the time it takes the wireless signal to travel from the router to the laptop?

Answers

The answer would be 2500 Bits

Approximately 7.446 megabits of data are downloaded to the laptop during the time it takes for the wireless signal to travel from the router to the laptop.

How to solve

To find the number of bits downloaded to the laptop in the time it takes for the wireless signal to travel from the router to the laptop, we can use the formula:

Total bits downloaded = Download speed (in bits per second) x Time (in seconds)

First, we need to convert the download speed from megabits per second (mbps) to bits per second by multiplying it by 1,000,000 (since 1 megabit = 1,000,000 bits).

So, the download speed in bits per second = 252 mbps x 1,000,000 = 252,000,000 bits per second.

Now, we need to calculate the time it takes for the wireless signal to travel from the router to the laptop. The distance is 8.7 meters.

The speed of light, which is the speed at which wireless signals travel, is approximately 299,792,458 meters per second.

Time (in seconds) = Distance (in meters) / Speed of light (in meters per second)

Time = 8.7 meters / 299,792,458 meters per second ≈ 2.9006 x 10^(-8) seconds

Now, we can calculate the total bits downloaded:

Total bits downloaded = 252,000,000 bits/second x 2.9006 x 10^(-8) seconds ≈ 7.446 megabits

So, on average, approximately 7.446 megabits of data are downloaded to the laptop during the time it takes for the wireless signal to travel from the router to the laptop.

Read more about bits here:

https://brainly.com/question/1989676

#SPJ3

A loop that repeats a specific number of times is known as a(n):

Answers

A loop that repeats a set number of times is a for loop.

Python example:
for x in range(1, 10, 1):
     #logic

C example:
for (int i = 0; i < 5; i++)
{
     //logic
}


Rules armed services appropriations and judiciary are all examples of ___ commites

Answers

the senate judiciary committee held hearings on Neil gorsuch's nomination to the U.S. supreme court from March 20-23,2017. Grocsurch was president Donald Trump's first nominee to the U.S. supreme court. gorsuch was nominated on January 31, 2017, to succeed justice Antonin scalia, who died February 13,2016 

What do file management utilities do?
A. make it possible for you to change the way text files are displayed on the screen

B. make it possible for you to permanently remove deleted files from the computers

C. make it possible for your computer to play movies and podcasts

D. make it possible for your OS to save, maintain, and access files

Answers

D. make it possible for your OS to save, maintain, and access files.

Targeting encourages drivers to scan far ahead and _____________. A. focus their visual attention on the next point on the road B. check the road behind the vehicle C. reach their destination faster D. do not look to the sides

Answers

A. focus their visual attention on the next point on the road.  A driver must have a target, it can be the car in front, a building pr a structure on the road.  Targeting enables the driver to look further ahead on the road and thus be ready for any obstacle on the road.
The answer is (A) Focus their visual attention on the next point on the road.

A fixed object located 12 to 20 seconds ahead of your car on the road should be considered as your visual target. It can be anything from a traffic signal, the crest of a hill, a parked car, or a traffic signal. Your visual target should always be ahead of you on the road and should be at the center of your field of vision. Once a target has been established, a driver should be able to set effective reference points, identify alternative paths, anticipate a number of traffic situations ahead, and notice the presence and changes of traffic flow.

When you see a/an _______ pointer, this means you can drag the row or column border to change height or width.

A. double-headed
B. hand
C. crosshair
D. I-beam

Answers

A. double-headed pointer

Answer: double-headed

Explanation:

Peter’s Father wants to buy a new computer for his office use on word processing tasks. He wants to bring his computer to and from his workplace and home. He also wants to lower the cost as much as possible

Answers

A good option for Peter's father's computer needs would be a laptop or a notebook.  It is handy so he can bring it to and from the office.  It is also has the specifications needed for his word processing tasks as long as he installs a work processing software.
The best computer to use is a laptop computer.
A laptop is a personal computer that can be easily carried to a number of locations.It runs the same set of software and set of files as that of a desktop computer.
Advantages of using a laptop computer is that it is highly portable and allow you to use your computer almost everywhere.So you get more work done and no time is wasted.He can also use it during travelling where he can attend to his clients anytime..
The other advantage is that it lowers  power consumption .This is beneficial for it lowers the cost.
so i will recommend a laptop computer.

An application is software that allows you to perform a specific task true or false

Answers

the answer of the question was true

A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.

Answers

Master (Primary Device(s)), Slave (Secondary device)

Excel charts are either placed in their own chart sheets or embedded in a worksheet. ____________
a. True
b. False

Answers

Excel charts are used to display data in ways that are meaningful to your audience.
The statement that Excel charts are either placed in their own chart sheets or embedded in a worksheet is true.
When you create a chart, it is embedded in the worksheet that contains the data source.

Symbols can enhance your text. You can add mathematical or currency symbols, geometric shapes, and even smiley faces. Under which menu would you find the Symbols box?

a) Insert menu
b) Format menu
c) View menu
d) Symbols menu

Answers

The answer is D. Hope this helped.

Amy wants to controls the overall process of creating digital designs. Which career is Amy pursuing?
sound producer
photographer
art director
game designer

Answers

Game designer

I hope this helped

"when a user clicks "submit" on a web-based survey"

Answers

What's the rest of the question so I can help.

When a user clicks submit, then their answers are turned in.
I’m not sure if this was the answer you were looking for, but I’m guessing.

After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:

Answers

This is TRUE

Assume you want to use a PIN LOCK on your Microsoft Account; you can do this without routinely using the account password in your windows machine. A PIN can only be used to unlock the device you activate it on. 

Thus, if someone steals the PIN you used to unlock your laptop with, they will have access to only that one laptop and not your entire Microsoft account. This PIN should only work to the device you set it up on and not to any other devices.






Other Questions
How many grams are in 6.53 moles of Pb One difference between organisms being classified as Kingdom Plantae or Kingdom Animalia is the way the organism gets food. Which statement correctly states the difference between the two kingdoms? A)Kingdom Plantae organisms are herbivores and Kingdom Animalia organisms are carnivores. B)Kingdom Animalia organisms are herbivores and Kingdom Plantae organisms are carnivores. C)Kingdom Plantae organisms make their own food and Kingdom Animalia organisms do not make their own food. D)Kingdom Animalia organisms make their own food and Kingdom Plantae organisms do not make their own food. At a ski resort there are three different chair lifts that will take you to the top of the mountain. There are six ski trails to the bottom of the mountain. How many different paths are there to go up and down the mountain? Will give brainliest please help ASAP If BC -16 and BD-9 then find the length of BA. Show the work you use to find your answer. Draw the two similar triangles separately to help set up the proportion. What is emphasized by Alices and the Queens differing points of view? (Through the Looking Glass story)A. The garden is a dangerous environment.B. Alice must follow the Queens leadership.C. Alice is overwhelmed by the scenery in the garden.D. The garden is a place that follows a different type of logic. eva estimates that 475 songs will fit on her mp3 player the actual that fit is 380 findc the percent error Trigonometric Help Plz? What component of membrane contains a hydrophobic region and acts as the primary barrier to most foreign substances? Which line from "Safari Day in Kenya contains an example of assonance? Surface area of right cone radius of 8 and 14 heightA. 896B. 224 C. 176D. 167 Alice is 45 years old. compared to her sensory abilities in her mid-20s, today she likely is better able to: Please help me. I'm confused. Consider the following geometric sequence. -5, 10, -20, 40,... If the recursive formula for the sequence above is expressed in the form a^n=b*^n-1, determine the value of B. B= (choices are 2, -2, 5, -5) When a strongly conditioned cs is used to make another stimulus into a second cs, the effect is known as ________? An electronics shop offers a small ic chip for $1.50 per unit and $4.00 for large ic chip. on a certain day, 2200 chips were sold and $5050 is collected. how many small ic chips and how many large ic chips were sold? PLEASE ANSWER What was a rule made by the government? 9 letter word In African cultures, music can be used A. to ensure the delivery of a healthy baby. B. for all of the above. C. to lift up prayers to a deity. D. as the vehicle of the sacred word of the deities. You buy boxes of strawberries at the market. Each box costs $ 6 Write an equation for the number of dollars, d, you spend on b boxes. Help me please. Appositive Page. Does anyone know how to prove that OAC and OBC are Congruent.