1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
4 years ago
14

Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he

works and what he does there?
Computers and Technology
2 answers:
Yanka [14]4 years ago
4 0
IN a laboratory... C 
Arada [10]4 years ago
4 0

Answer:

IN a laboratory... C

Explanation:

You might be interested in
In the context of object-oriented programming a(n) is a template for a group of objects with similar characteristics.
MArishka [77]

A class is a template for a group of objects with similar characteristics.

An object-oriented programming uses objects, instead of <em>functions and logic </em>to model software designs.

In an object-oriented programming, there are:

  • Objects
  • Classes
  • Methods
  • Etc

Objects are what make up the object-oriented programming.

Similar objects are grouped together into classes

Hence, the text that completes the blank is class

Read more about object-oriented programming at:

brainly.com/question/22530356

7 0
3 years ago
Come up with a system, using only
masha68 [24]

Explanation:

material

3 balões de erlenmeyer. .balanca

funil. . carbonato de

. rolha

. tubo abdutor

. seringa

8 0
3 years ago
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
Which of these words could byte pair encoding compress the most?
nlexa [21]

Answer:

My dad

Explanation:

7 0
4 years ago
Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
astraxan [27]

Answer:

Check the explanation

Explanation:

• We are taking a look at the class B network beginning with 172.0.0.0.0,while Converting this value to binary as:10101100.00010100.00000000.00000000.  32 bits in total, out of this the First 16 bits that are used as network ID and the subsequent 16 bits are used as HostID.Out of the 16 bits that are sued for Network ID the 2 bits namely Bits fifteen and sixteen (15 and 16) have been set and can't be changed and hence only 14 bits are used as network ID.

• Now so that we can divide this network into 50 subnets for class B network we will have to borrow a bit as shown below:

• 10101100.00010100.00000000.00000000=172.0.0.0.0,Adding 1 bit by borrowing from host portion and adding it to network ID will give it 10101100.00010100.00000000.00000000(0 shown in bold) or10101100.00010100.10000000.00000000 (1 shown in bold) will give us 2 unique subnets.i.e changing 1 bit will give us 2 power 1=2 subnets,thus changing 2 bits will give us 2 power 2 subnets =4 similarly changing 6 bits will give us 64 unique subnets.

• Which means and going by the above problem statement in case we need 50 subnets and we also need to change 6 bits in the Network ID to give 50 unique subnets.

• Thus the answer is 6

3 0
4 years ago
Other questions:
  • write a c++program that allows the user to enter the last names of fivecandidates in a local election and the number of votes re
    15·1 answer
  • Which education level has the highest return on investment (ROI)? AHigh School Diploma BROI is equal for all of the above. CSeni
    6·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • What is different between a pc mouse and a real mouse
    12·2 answers
  • Yall like portal 1 or 2
    8·1 answer
  • In which step is a metaphor used in planning a multimedia presentation
    15·1 answer
  • Name the written test a potential driver must pass and list the minimum required score to earn a learner’s license.
    8·2 answers
  • HELP PLEASE!!!
    7·1 answer
  • System software includes all of the following except
    10·1 answer
  • As the complexity of a network increases, the possibility of security breaches decreases. is this true or false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!