1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
3 years ago
6

Need help this is for my technology class. We are doing a city research paper but it’s the rough draft and I’m doing la. But I c

an’t find any businesses that are in la and I need 5 please help please please
Computers and Technology
2 answers:
S_A_V [24]3 years ago
7 0

Answer:

Wendy's

Explanation:

serious [3.7K]3 years ago
5 0
One business is " Backwards Beekeepers," Your welcome. >,<
You might be interested in
What is a traffic controller?what are its functions?
olchik [2.2K]

Answer:

A traffic controller is basically a system design to regulate traffic in a controlled manner with a set of traffic rules to follow so as to ensure public safety .

The main functions of a traffic light controller are listed below:

  • To direct  and regulate vehicular and pedestrian traffic
  • To ensure safety of construction workers, emergency response team and public in general in order to avoid accidents
  • These also uses CCTV and other monitoring system to manage flow of traffic and suggestion concerned with traffic congestion. These are provided by local or state authorities.
  • To ensure smooth traffic flow in order to save time and chaos.

4 0
3 years ago
Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
slega [8]

Answer:

C.

Explanation:

In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.

Thus, 1 - 3 - 4 - 2

Cheers

3 0
3 years ago
The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
professor190 [17]

<u>Answer:</u>

CIRCLE.JAVA

public class Circle {

  <em>private</em><em> </em>double radius;

  <em>public</em> Circle(double myRadius) {

    radius = myRadius;

    private void setRadius(int myRadius){

    radius = myRadius;

 }

 <em>public </em>double getDiameter() {

    return radius*2;

 }

 public double getRadius() {

   return radius;

 }

 <em>public </em> double getPerimeter() {

   return Math.PI*getDiameter();

 }

 <em>public</em> String toString() {

    return "Circle with a radius of " + radius;

 }

}

CIRCLE TESTER.JAVA

public class CircleTester {

 public static void main(String[] args) {

    Circle circ = new Circle(10);

    circ.radius = 5;

    System.out.println(circ);

    System.out.println("The diameter is " + circ.getDiameter());

    System.out.println("The perimeter is " + circ.getPerimeter())

 }

}

<u>Explanation:</u>

public class Circle {

  //This could be made private or public.

  //Making it private is better

  <em>private</em><em> </em>double radius;

  //This is a constructor. It should be made public

  //since it would most likely be used in another class

  //to create an object of this class.

  //Making it private means no other external class can create

  //an object of this class.

  //Since the tester class (CIRCLETESTER.java), as shown on line 3,

  // needs to create

  //an object of this class, this should be made public

  <em>public</em> Circle(double myRadius) {

    radius = myRadius;

    private void setRadius(int myRadius){

    radius = myRadius;

 }

 //This should be made public since it will be

// used in another class (CIRCLETESTER.java in this case)

 <em>public </em>double getDiameter() {

    return radius*2;

 }

 public double getRadius() {

   return radius;

 }

 //This should be made public since it will be

 //used in another class (CIRCLETESTER.java)

 <em>public </em> double getPerimeter() {

   return Math.PI*getDiameter();

 }

 //The toString() method is the string representation

 //of an object and is called when there is an attempt to

 //print the object. It should be made public since it will

 //be used in another class (CIRCLETESTER.java)

 <em>public</em> String toString() {

    return "Circle with a radius of " + radius;

 }

}

CIRCLE TESTER.JAVA

public class CircleTester {

 public static void main(String[] args) {

    Circle circ = new Circle(10);

    circ.radius = 5;

    System.out.println(circ);

    System.out.println("The diameter is " + circ.getDiameter());

    System.out.println("The perimeter is " + circ.getPerimeter())

 }

}

8 0
2 years ago
1.How does inertia affect a person who is not wearing a seatbelt during a collision?
KIM [24]
1. during a collision, the person not wearing a seatbelt is already in motion. there is no outside force (the seatbelt) to stop this motion. 
2. Kinetic Energy = 0.5 * m * v^2  because velocity is a squared term, doubling the velocity actually quadruples the kinetic energy, making the stopping distance much much greater
3. by the same logic as above, mass is not a squared term, therefore doubling the mass will double the kinetic energy, increasing the stopping distance -- but by not as much as increasing the velocity.
4. because a driver cannot alter the mass of his vehicle, the best way to enter sharp curves would be decreasing velocity (speed)
5. there are many factors that determine the degree of damage (to humans and property in a crash), most notably the size of the vehicle(s) and velocity.
6 0
3 years ago
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua
Veseljchak [2.6K]

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

8 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • Can someone help me with this one
    9·2 answers
  • If you turn on the Lock alpha button , what happens
    5·2 answers
  • A web page ____ can also create a style sheet that takes precedence over the internal style sheets of browsers.
    10·1 answer
  • If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5
    13·1 answer
  • Me inculparon de crear una cuenta en Facebook y colocaron el barrio donde vivo, ¿cómo podría demostrar lo contrario? Ayuda urgen
    6·1 answer
  • Convert the given for loop to while loop and find the output of the program assuming the
    14·1 answer
  • Write a deffrentiate between inkjet peinter and laser printer​
    8·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!