1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
13

It is not recommended by the USA EPA, but adding refrigerant to a leaking A/C system is

Computers and Technology
1 answer:
Alecsey [184]3 years ago
6 0
......but adding refrigerant to a leaking A/C system is feasible as long as long as all leaks are repaired first, before recharging or topping off an MVAC system. Topping off (adding refrigerant to a leaking system) is legal everywhere in the U.S apart from where local laws prohibit it.




You might be interested in
On March 2, 2022, is birthday wish me a happy birthday
mash [69]

Answer:

happy early birthday hope you have a great day

6 0
3 years ago
Read 2 more answers
Which View option allows you to view your document as it would appear when posted online?
kondaur [170]

I assume this is in regards to Microsoft Word?


If so, then the Web Layout view will allow you to view the document as it would look on a webpage.

3 0
4 years ago
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
xz_007 [3.2K]

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

3 0
3 years ago
What protocol allows us to use a domain name like .com instead of an ip address?
san4es73 [151]
The answer is DNS (Domain Name System)

IP addresses are difficult to remember and therefore, the internet allows you to specify a computer using a host name. The same case happens to DNS. It maps domain names to IP addresses. Domain names are alphabetic making them easier to remember.



4 0
3 years ago
________ uses shared computing resources instead of having local servers or devices to handle computing applications.
Oksanka [162]

Answer:

cloud computing

Explanation:

3 0
3 years ago
Other questions:
  • n the declaration: string color = "blue"; A. the string literal color is assigned to the string reference "blue" B. the string r
    11·2 answers
  • (The Location class) Design a class named Location for locating a maximal value and its location in a two-dimensional array. The
    10·1 answer
  • Refers to the programs or instructions used to tell the computer hardware what to do.
    8·1 answer
  • Which of the following is a scam where perpetrators promise high pay for working on different projects like wooden calendars, pa
    13·1 answer
  • EMERGENCYYYYY what does it mean when i get a security alert when i download an addon on google docs
    7·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Write a program that will read the payroll file. It should output the name and paycheck amount. Also output the total pay of all
    13·1 answer
  • Which design monument beginning with A inspired the chrysler building in New York​
    14·1 answer
  • Which type of protocol provides a way to transfer files from one computer to another over any tcp/ip network, such as a lan or t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!