II. MULTIPLE CHOICE (five points each)
6. Units on the mechanical scale are marked off in:
a. Fractions and millimeters
b. Feet and inches
c. Inches and fractions
7. Units on the architectural scale are marked off in:
a. Fractions and feet
b. Scales and measuring devises
c. Feet and inches
8. Units on the civil scales are marked off in:
a. Whole numbers and feet
b. Whole numbers and fractions
c. Decimals with no fractions
9. The number zero is:
a. The end of the metric scale
b. The middle of the scale
c. The beginning of all scale
10. The metric scale is marked off in:
a. Both inches and fractions
b. Architectural units and metric
c. Meters

Answers

Answer 1
Jsjajxhuwjakzjwidhwbjrjsbd

Related Questions

Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out the number of vowels in the string.
For example, given the input string of "Hello, World!", the program should print out the value 3 for the three vowels, "eoo", in that string.
Complete the following file:
CountVowels.java
import java.util.Scanner;
/**
Reads a string and counts all vowels contained in that string.
Vowels are A E I O U a e i o u.
Input: the value of s, a string
Output: the number of all the vowels in s
*/
public class CountVowels
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String s = in.nextLine();
// your work here
System.out.println(count);
}
}

Answers

Answer:

Answered below

Explanation:

public class CountVowels{

public static void main (String[] args){

Scanner in = new Scanner(System.in);

String words = in.nextline();

String vowels = "aeiouAEIOU";

int count = 0;

for( int i =0; I< words.length-1; I++){

for( int j = 0; j < vowels.length - 1; j++){

if(words [I] == vowels[j]){

count++;

}

}

}

System.out.print(count);

}

}

Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob. No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key. Therefore the entire encrypted message serves as a

Answers

Answer:

The answer is "Digital signatures".

Explanation:

The digital signatures are also recognized as asymmetric authentication, which is based on popular data cryptography. It generates the individual virtual wrist, which identifies consumers and protects information into digital communications or files. The digital certificate algorithms like RSA can generate two keys, one is the person or one public, that can be connected numerically.

What are examples of Marketing, Sales, and Service careers? Check all that apply.


Receptionist

Construction Manager

Salesperson

Cashier

Personal Financial Advisor

Advertising Sales Agent

Purchasing Manager

Answers

Answer:

The correct alternatives are "Option C", "Option D", "Option F" and "Option G".

Explanation:

The built environment industry includes innovative developers, finance professionals, marketing strategies, and therefore all various advertising service delivery career opportunities. Sales configurations usually involve Corporate Development Management teams, Store executives, Call Centre Staff, Quality Assurance as well as Directorate Client Services.

Some other given selections are not comparable to the circumstance in question. So above, there's the correct approach.

Answer:

Salesperson

Cashier

Advertising Sales Agent

Purchasing Manager

[C, D, F, & G]

Explanation:

What is the most likely to be a possible physical attack?

Answers

Answer:

Physical attacks (also called kinetic attack) are. intentional offensive actions which aim to destroy, expose, alter, disable, steal or gain unauthorised access to physical assets such as infrastructure, hardware, or interconnection.

Explanation:

Which is the incorrect statement

Answers

Answer:

Chain multiple ifs with ElseIf.

Create an online order form for a car rental store and include the following items: input text box to enter the number of days input text box to enter the vehicle type (car, suv, ...) input text box to enter the number of designated drivers submit button to send form data to a server Note: the submit button is just to create a complete form. You do not have to define form action attribute for this assignment. Submit: HTML file and any other images and/or style sheets used to complete the design.

Answers

Answer:

Explanation:

The following is the barebones HTML code for the form which can be saved as is or implemented into your own site. No styling or images were added since that is done based on the overall styling of the website in which the code is being implemented.

<!DOCTYPE html>

<html>

<body>

<h2>Car Rental Store</h2>

<form action="/action_page.php">

 <label for="fname">Number of Days:</label><br>

 <input type="text" id="fname" name="fname" value="Ex. 20"><br><br>

 

 <label for="lname">Vehicle Type:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. SUV"><br><br>

 

 <label for="lname">Number of Designated Drivers:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. 2"><br><br>

 

 <input type="submit" value="Submit">

</form>  

</body>

</html>

Which of the following statements are true? Check all of the boxes that apply. Networks are expensive to set up and maintain. Networks are easy to set up. Intruders into a network cannot disrupt network connectivity for users. Network staff need to keep accurate records on what has been done to a network.

Answers

Answer & Explanation:

I'm not expert on this, but I'm pretty sure that the correct answers are:

Networks are easy to set up. & Network staff need to keep accurate records on what has been done to a network.

These choices just generally make the most sense...

Hope this helps and have a great day!! ❤

24/3*2^2/2*3+(20-10)-40

Answers

Answer:

34

Explanation:

You use pemdas

The final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback.

a. True
b. False

Answers

Answer: True

Explanation:

The Data Science Methodology is simply referred to as an iterative and continuous methods that is required by data scientists to guide them on the approach that they'll use to tackle and solve problems typically through a number of steps.

It should be noted that the final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback. The main aspects involves:

• Problem

• Approach;

• Requirements

• Collection

• Understanding

• Preparation

• Modelling

• Evaluation

• Deployment

• Feedback.

Therefore, the above statement is true.

Copy the skeleton of code below into your answer. Then in the space indicated, add your own code to prompt the user for two numbers and a string and then prints the difference of those numbers with a message to the user (text in bold is input entered by the user). Note that the final output should be on a line by itself. Recall that the difference of two numbers is found by subtracting the second number from the first.

Enter the first: 10
Enter the second: 3
Enter your name: Dinah Drake
Dinah Drake, the difference is 7

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter the first: ");

 int first = input.nextInt();

 System.out.print("Enter the second: ");

 int second = input.nextInt();

 input.nextLine();

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 int difference = Math.abs(second - first);

 

 System.out.println(name + ", the difference is " + difference);

}

}

Explanation:

*The code is in Java.

Create a Scanner object to get input from the user

Ask the user to enter the first, second, and name

Calculate the difference, subtract the second from the first and then get the absolute value of the result by using Math.abs() method

Print the name and the difference as in required format

Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?

Answers

Answer:

modem....

Explanation:

i think thats what your asking

The technology which does NOT facilitate the transferring of data between computers in adjacent building is:

Bluetooth

According to the given question, we are asked to state the technology which does NOT facilitate the transferring of data between computers in adjacent building

As a result of this, we can see that from the complete question, we are asked  to select the answer between the available options which included fiber optics, twisted pair, and microwave, and the correct answer is Bluetooth

Therefore, the correct answer is Bluetooth

Read more about bluetooth here:

https://brainly.com/question/14043588

A security administrator is adding a NAC requirement for all vpn users to ensure the connecting devices are compliant with company policy. Which of the following items provides the HIGHEST assurance to meet this requirement?

a. Implement a permanent agent.
b. Install antivirus software.
c. Use an agentless implantation.
d. Implement PKI.

Answers

Answer:

c. Use an agentless implementation.

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, a security administrator is adding a network access control (NAC) requirement for all vpn users to ensure the connecting devices are compliant with company policy. The item which provides the highest assurance to meet this requirement is to use an agentless implementation because the network access control (NAC) codes do not reside on the host device and the end user does not have to download any link to use it.

In 25 words or fewer, list some traits or qualities you think a manager
might need in order to do his or her job effectively.

Answers

Answer:

- Be understanding. Things arent always gonna go great. So, if your understanding issues can go way smoother.

- Be a great meditator. Employees arent always going to get along. But, when there is conflict you need to be a good mediator to help conflict. If you're taking sides because your closer to one employee or one employee likes the same song as you, your not a good meditator, and you shouldn't be a manager.

- Be kind. Being kind is always the #1 rule in life. It helps you in life. Being mean to your employees isn't good and will most definitely want them to quit their job.

You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.

In this lab, your task is to complete the following:

-Use the following troubleshooting tools to diagnose the problem in the network:
-the ping, ipconfig, or tracert command utility
-the network and sharing center in the windows 10 or windows server 2016 operating system
-the DHCP server console in the windows server 2016 operating system

Answers

Answer:

Explanation:

The first thing that you should do would be to ping the computer in the Networking Closet, if this fails then the next step would be to ping the service provider. If both of these pings fail it is most likely because the configuration of the IP addresses are configured wrong. In this case use the command prompt to type in the following

ipconfig /all

this will open up the entire configuration info. If the problem is truly the configuration then your DNS address should show up as not configured. This can happen when a DHCP is enabled. Check if DHCP is enabled, if so then you would need to type the following into the command prompt

ipconfig /renew

This will renew the ip address information from the DHCP server and should create the proper DNS configuration as well and solve the issue.

Following are the solution to the given question:

Initiate troubleshooting in the Executive by exploring the scope of the connectivity issue. Ping the laptop in the network closet from your workstation. A ping to a location failed.Ping your internet service provider. The ping to the address fails.Verify any connection issues here between workstations, the Network Closet computer, and also the ISP in the IT Administrator's office. (Pings to both locations failed.) The issue is now almost definitely due to the channel's IP setup.To examine the Local Area Connection setup, open the cmd in the Executive Office and type ipconfig /all. Some of the following issues must be noted: The workstation's default route and DNS server addresses have still not been configured.It implies that connectivity is confined to computers just on the local network.Its DHCP Enabled option has been enabled. Yes, a DHCP server is configured just on the workstation. Its line with the DHCP Server address wasn't shown. This means the workstation was unable to communicate with the DHCP server. This IP address corresponds to an APIPA domain (169.254.0.1 to 169.254.255.254). It shows that the computer assigns an IP address to it only. The workstation would be capable of communicating with the other hosts on the local network who have given their unique IP via APIPA.Verify that its DHCP service for the local area network is active and active in the Network Closet.CORPSERVER should be the first option in Hyper-V Manager. To see all the virtual machines, open the window. Join by correcting CorpDHCP (maximize the window for easier viewing if desired). For launch, the DHCP console in Server Manager, go to Tools > DHCP. CorpDHCP.CorpNet.com must be extended. IPv4 enlargement.Scope [192.168.0.1] Subnet1 has a dropdown, suggesting that this is not operational. Select Activate from the menu bar of Scope [192.168.0.1] Subnet1. The scope's "dislike" button has gone, and the DHCP service for the local network is now operational.Launch the command prompt inside the Executive and type ipconfig /renew. This will obtain the new Ip from the DHCP server and change the Ethernet connection settings.To check the Internet setup, type ipconfig /all. You should now see lines for the default gateway, DNS server, and DHCP server, and a new IP address in the DHCP scope for the local network.Ping the ISP in the Executive Office to confirm that the problem has been resolved. Your ping to the ISP is good.Rep step 6 in the IT Administrator Office to fix the dispute with the workstations.

Learn more:

brainly.com/question/14728944

Plz answer this question for me quick for a Brainly

Answers

which bird is the symbol of peace ?

dove

advantages and disadvantages of screen reading​

Answers

Explanation:

do u mean screen reading as in reading books in ur mobile ?

if so then disadvantage is the amount of eye strain u get staring into the screen

and advantage is the portability.

9 Which of these words is used to begin a conditional statement? ​

Answers

Answer:

The word used to begin a conditional statement is if.

Explanation:

In the syntaxes of most (if not all) programming languages, the word if is used to begin any conditional statement.

Take for instance:

Python:

if a == b:

   print("Equal")

C++:

if(a == b)

cout<<"Equal";

Java:

if(a==b)

System.out.print("Equal")

The above code segments in Python, C++ and Java represents how conditional statements are used, and they all have a similarity, which is the "if" word

Tim has completed his work. What feelings toward his work will give him a sense of purpose, energize him, and also inspire him as an individual
to achieve more and build on his strengths?
Tim takes ____
in his work.

Answers

It should be Tim takes pride

I can’t get answers because the ads won’t load help me

Answers

Answer: Get better wifi

Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.

A town government is desinging anew bus system

Answers

Answer:

Umm what? Are you talking about the type of problem it is? If so it is an optimization problem.

Explanation:

I had something like this for one of my tests and I chose the optimization problem because it finds the values of decision variables that result in a maximum or minimum of a function.

But ion know if it's this that you are talking about

Edhisive 3.5 code practice

Answers

Answer:

x = int(input("What grade are you in? "))

if (x == 9):

   print ("Freshman")

elif (x == 10):

   print("Sophomore")

elif (x == 11):

   print ("Junior")

elif (x == 12):

   print("Senior")

else:

   print ("Not in High School")

Explanation:

Need help please asap

Answers

Answer:

Its C that is the answer hahahahha

If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Pub-Sub design pattern is an abbreviation for publish-subscribe design pattern and it refers to a type of architectural design pattern that typically involves using a framework that enables the exchange of messages from the senders (publishers) to the recipient of the messages (subscribers) without having to program the messages.

Hence, if you are able to anticipate that the components are likely to be reused in future projects then it is advisable to use the Pub-Sub design pattern.

Which of the following are characteristics of RG-6 cabling specifications? (Select 3 answers)

a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television and cable modems
d. Suitable for short-distance cable runs
e. Twisted-pair copper cabling

Answers

Answer:

a. Coaxial cabling

b. Suitable for long-distance cable runs

c. Used for cable television, satellite television, and cable modems

Explanation:

RG-6 cable is a coaxial cable type commonly used in television cable for transmitting the signal from the receiving antenna to the television port. It is also used in cable modems and satellite television. Unlike the ethernet cable, it is suitable for long-distance cabling.

Meaning of ‘integrity of data’

Answers

Answer: i have no idea

Explanation:

Accuracy of data (I think)

advantages and disadvantages of screen reading​

Answers

It can make ur eyes blind blind that’s a disadvantage

Answer:

Advantages:

1.) It allows a blind person to use the computer

2.) It allows a blind person to create a document using a word processor like MS Word

3.) With the help of a screen reader, blind musicians now use audio editing software to record, edit and save their songs for example

Disadvantages:

1.) Because visually impaired people only listen to a screen reader reading the text displayed on the screen, they don’t usually have the chance to know the correct spelling of a certain word especially when it’s not that common like medical terms etc. Sure they can make a screen reader to read character by character after they hear a word that they don’t know the spelling but I find it very time-consuming.

2.) Screen readers use a computer sounding voice and some people find this very boring. Some companies are doing their best to create speech synthesizers that can mimic how humans read a sentence; like the proper intonation, but so far I would say that even we see some big improvements for the past years, they are still far from achieving their goals.

Hope this helped!

Have a supercalifragilisticexpialidocious day!

5. Which one of these can connect directly to the internet?
a. Servers
b. Packets
C. Client
d. Internet Users

Answers

Answer:

Servers

Explanation:

A server can directly connect to the internet.

Internet users can connect directly to the internet is the answer to this question.

The server is what helps other networks or programs to function. They hosts websites and provide data to other computers. A client connects to a remote computer.

Packets are formatted units of data that are used to communicate over a TCP/IP network.

An internet user has direct connection to the internet. Just as the name internet users imply, we can tell that they can connect to the internet already.

read more at https://brainly.com/question/2662676?referrer=searchResults

someone help please!! i’ll give brainliest

Answers

Answer:

1-Mouse

2-Display

3-Printer

4-Keyboard

Explanation:

1-mouse
2-printer
3-display
4-keyboard

Complete the statement below using the correct term.

The ___ phase in a project includes an analysis of what technology is in use.

*No multiple choice

Answers

Answer:

im pretty sure it is the implementation phase. But i can't be too sure about it.

Mary is a big fan of tropical fish. She has a few tanks of fish at home. To maintain a healthy environment for the fish, she needs to add conditioner to the water once a week. The amount of conditioner added is determined by the volume of the tank. According to the direction on the bottle, she has to add 1 ml of conditioner per 100 cubic inches of water. She wants a program to calculate exactly how much conditioner to add to a tank of water. All tanks are in rectangular shape. The program will ask for the length, the width and the height of the tank. It will calculate and display the amount of conditioner to be added. [Note: volume = length X width X height] Use the following two test cases for desk-checking [all in inches]:
length width height
20 22.5 10
16 10 15
Write a C++ programs that implements and then add code to write the result to an output file. Make sure you generate a description message with the data in the output file (i.e. The amount of conditioner to be added is 3 ml).
outFile << "The amount of conditioner to be added is "<< amount<<" ml"< Name output data file "conditioner.txt" .

Answers

Answer:

Answered below

Explanation:

# Program is written in Python programming language

conditioner_in_ml = 0

width = float(input("Enter width in inches: "))

height = float(input("Enter height in inches: "))

length = float (input("Enter length in inches: "))

#Calculate the volume

volume = width * length * height

#Calculate the amount of conditioner per 100 #cubic inches of volume

conditioner_in_ml = volume/ 100

print("The amount of conditioner required for $volume cubic inches is $conditioner_in_ml ml")

Other Questions
a rectangular pen has a lenght of x meters and a perimeter of 420 meters . find a function for the rea of the pen in term of x.Area:Lenght:Width: (PLEASE HELP I GIVE BRAINLIEST)Which group of sentences best uses a variety of sentence patterns to convey meaning and the relationship between ideas?The cat curled itself into a ball. It purred. Its human scratched its chin. The cat curled itself into a ball. Its human scratched its chin. When it felt the scratching, it began to purr.The cat curled itself into a ball. It began to purr when its human scratched its chin.The cat curled itself up, so it was a ball. Its human scratched its ears, so it purred. g(x) = x^2-6 / 3x + 10 g(4) = Be sure to simplify your answer. what does it mean for a ordered pair to be a solution to a linear equation PLS HELP ! ILL MARK BRAINLIST Which expression is not equal to the expression shown?33 : 3-4 The first note of the scale is always called Mi.Question 7 options: True False Convert 20 C to F -40 C to F40C to F An economist creates a scatter plot comparing years of experience to yearly salary (in dollars) at a particular company. The trend line through the data can be described by the equation y = 4,000x + 20,000.What is the initial value and what does it mean?Question 1 options:4000; For their every year of experience an employee has, their salary goes up by this amount.20000; Regardless of how much experience an employee has, this is the minimum amount the employee will earn at this company.4000; Regardless of how much experience an employee has, this is the minimum amount the employee will earn at this company.20000; For their every year of experience an employee has, their salary goes up by this amount.Question 2 (1 point) An economist creates a scatter plot comparing years of experience to yearly salary (in dollars) at a particular company. The trend line through the data can be described by the equation y = 4,000x + 20,000.If someone has a yearly salary of $52,000, to the nearest whole year, how many years of experience do they have?Question 2 options:8228132 According to the text, what did many workers do afterthe Great Depression hit? They came to South Florida to find seasonal workon farms.They left Florida to find work in other parts of theUnited StatesAt the beginning of the 1930s, twenty-six percent ofFlorida's population was dependent on some form ofpublic relief.The Great Depression brought with it skyrocketingunemployment and the dislocation of millions of workersfrom all walks of life. Migrant workers-often entirefamilies-went in search of jobs wherever they could befound, adding their numbers to the thousands of seasonalworkers recruited by large agricultural companies inSouth Florida each year during harvest time.-Florida Memory and the State Library and Archives ofFloridaThey lost farming jobs and looked for work infactories instead.They settled permanently in Florida to work atbanks and other businesses. Sarah bought snacks for her team's practice. She bought a bag of chips for $3 and a 8-pack of juice bottles. The total cost before tax was $18.76. Which equation could be used to determine x x, how much each bottle of juice costs? Plz help me!!!!!!!! Which expressions are equivalent? A.B.C.D. Ling made a study chart for science class.Which organelle accurately completes the chart?A- LysosomeB- Cell wallC- VacuoleD- Endoplasmic Reticulum Help I'm timed and I give out brainlist How many moles of Al2O3 are formed from the reaction of 6.38 mol O2 and 9.15 mol Al? How was Sumerian culture affected by Sargons rule? Which of the following possibilities will form a triangle? (1 point)Question 4 options:1) Side = 10 cm, side = 5 cm, side = 6 cm2) Side = 10 cm, side = 6 cm, side = 3 cm3) Side = 11 cm, side = 5 cm, side = 6 cm4) Side = 11 cm, side = 5 cm, side = 5 cm 5A) SSSC) SASB) ASAD) AAS four difference between electrolytic cell and electrochemical cell I need help please!:D