1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
6

A(n) ____ web site structure connects web pages in a treelike structure.

Computers and Technology
1 answer:
galben [10]3 years ago
6 0
Is it a multiple choice question?

You might be interested in
Machinery with rotating or reciprocating parts that are within seven feet of the floor or working platform requires what additio
SOVA2 [1]

Answer:

Effective guards

Explanation:

Risks appear when parts of the machine move or have the potential to move. The movements can be rotation, displacement, transverse or alternative (eg from top to bottom or from back to front).

Basic types of guards or effective protections on machines. There are in many ways, including:

-  Guards, physical barriers designed as part of the machine, or added to the machine, for example envelopes (fixed or mobile), covers, shields, etc;

- Presence Detection devices, do not prevent access but stop the movement of dangerous parts before contact with them is achieved, for example light curtains, area scanners and pressure mats;

- Protection devices, do not prevent access or stop the machine but allow safer operation. For example, "dead man" or "double keypad" devices;

- Alarms and Warnings, warn staff about the dangers. They can be permanent (eg warning signs) or activated when hazards appear;

- Emergency stops, do not prevent access to dangerous parts or risk, but if activated during an emergency, they can avoid incidents or reduce them significantly.

Before selecting the type of guard, a machine risk assessment must be carried out.

3 0
3 years ago
PLEASE HURRY!!!<br> Look at the image below
Darina [25.2K]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given code is :

<em>def divide(numA,numB):</em>

<em>   quotient = numA/numB</em>

<em>   return quotient</em>

<em>#the main part of your program that calls the function</em>

<em>numC=40</em>

<em>numD=5</em>

<em>answer=divide(numC,numD)</em>

<em>print("Quotient", answer)</em>

<em>print (numA)         </em>

The variable numA scope is local to divide function.

Because you can not access this variable outside of the divide function. All other variables such as numB and quotient also local variables of the divide function. These variables can not be accessible outside the divide function.

6 0
3 years ago
Write a program named convertdate that converts a date entered by the user into another form. the user's input will have the for
Natali [406]
Hdhshevevsh plus v nah
5 0
3 years ago
Differentiate between the broadcasting and telecommunication
dexar [7]
Telecommunication over fixed lines is called point-to-point communication because it is between one transmitter and one receiver. Telecommunication through radio broadcasts is called broadcast communication because it is between one powerful transmitter and numerous low-power but sensitive radio receivers.
6 0
3 years ago
This shows you where text will appear as you type.
hoa [83]

Answer:  what?

Explanation:

4 0
4 years ago
Other questions:
  • Using the CPI to calculate the inflation rate​ _______________ the underlying inflation​ rate, and using the core inflation rate
    7·2 answers
  • What is heaven backwards?
    11·2 answers
  • One suggested means of gaining eye contact before reversing is to:____.
    12·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Welcome back to school people!
    15·2 answers
  • In client server network, there is no central server //// true or false​
    8·1 answer
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • How computer network reduce the cost of computer hardware? explain with example.​
    12·2 answers
  • Which file types have exe and png as their extensions?
    10·1 answer
  • How to hide location on iphone without them knowing?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!