1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
2 years ago
9

What is a very important difference there between the wiring of an electromechanical thermostat and an electronic programmable t

hermostat?
Computers and Technology
1 answer:
valentinak56 [21]2 years ago
7 0

Answer:

A mechanical thermostat will typically use a bimetal strip with two different metals that expand/contract with the temperature at different rates.

Explanation:

You might be interested in
A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
Aleonysh [2.5K]

<em>The answer is Crimper. </em>

<em> </em>

<em>Crimper is a networking device that would allow RJ-45 pins to get attached to UTP(Unshielded Twister Pair), CATs (Category Ns) and STPs (Shielded Twisted Pair) Cables. These are common type of cables used in computer networking. A crimper looks like a pliers only it has narrow ends with a hole where you would put RJ-45 devices together with the cables. In order to make the cable hold on to the RJ-45, the two hands must be squeezed together with an exact force (not too much force). Once the crimper made a sound, that means, your RJ-45 is now locked with the cables inside.  </em>

<em> </em>

<em>You must be very careful when using this device. Sometimes crimpers has blades that could peel off cables or cut them for alignment and proper attachments. A pair of gloves and googles are also advisable to wear when you use this device for safety measures.</em>

8 0
3 years ago
Nunya is a computer software company that employs highly intelligent, but somewhat unusual people. Every Friday, free lollipops,
mario62 [17]

Answer:

c. Stories

Explanation:

Informing employees about the founders by telling them at the beginning of each quarterly executive meeting, that the founders were three young people who got lucky and sold a video game that they invented is an example of stories technique for transmitting culture.

Cultural transmission is a learning process through which cultural elements, such as background ideas, attitudes, beliefs, ideals and historical values are passed on to individuals and groups.

3 0
3 years ago
How are the current and resistance related when the voltage of a circuit is constant?
andreev551 [17]
Since resistance and current are inversely proportional, when the resistance doubles, the current is cut in half.
5 0
3 years ago
Read 2 more answers
What properties make it suitable to be used for musical instruments?
Stolb23 [73]
<h2>Many properties can be listed out viz. durability, quality, the sound that it produces also depends on the material that is used, etc.</h2>

Explanation:

1. If you take wood then I would say maple, rosewood, cedar, walnut can be used to make "String instruments".

Reason:

The wood that we choose should be perfect and should give long-life to use the instrument.

2. If we consider about strings, then I would suggest that the material that you choose should be "ductile and hard".

Reason:

Thin wires can be drawn.

3. In case of Brass, it should be "malleable metal", so that the outcome of the instrument will satisfy the need.

7 0
3 years ago
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
Other questions:
  • Write a function chat accepts a pointer to a C-string as its argument. The function should count the number of vowels appearing
    5·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    12·1 answer
  • Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
    7·1 answer
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
    15·1 answer
  • Does this mechanism increase or decrease speed? Why?
    9·1 answer
  • To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microsec
    13·1 answer
  • Create a list called courses containing the names of your current courses.
    9·1 answer
  • How to install an older version of prettier on yarn
    9·1 answer
  • Helppppppppppppppp me please Can i have help for a ggogle class room
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!