1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
15

1. Which of the following statements is true regarding the use of refrigerants?

Computers and Technology
2 answers:
kondaur [170]3 years ago
5 0
A) Records of the dates and quantities of refrigerant recovered and recycled are unnecessary
CaHeK987 [17]3 years ago
5 0

Answer

The statement which is true regarding the use of refrigerants is; A. Records of the dates and quantities of refrigerant recovered and recycled are unnecessary

Explanation

A refrigerant is a substance in fluid form used in a heat pump and refrigeration cycle. A refrigerant absorbs heat from the environment and provides air conditioning when combined with a compressor or evaporator. Technicians are advised to do better recapture, recycle and dispose of refrigerant safely.


You might be interested in
Mirrors on cars exist to____.
TEA [102]

Answer:

c is ur answer

Explanation:

7 0
3 years ago
Read 2 more answers
Team A found 342 errors during the software engineering process prior to release. Team B found 184 errors. What additional measu
igomit [66]

Answer:

see explaination

Explanation:

The "size" or "functionality" of the project would need to be determined. Errors/FP would provide a normalized measure.

A metric such as DRE would provide an indication of the efficiency of SQA within both teams' software process.

3 0
4 years ago
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
Luda [366]
You have to add the integer
8 0
2 years ago
If you are using a sprite for your MakeCode Arcade game, which code block
xeze [42]

Answer:

set mySprite block

Explanation:

BRAINLIEST?

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which question best addresses the issue of risk with a new job?
    7·2 answers
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • Write a code that makes a 2D square array with 20×20 elements. Fill the array with random numbers initially. Then, "draw" a squa
    9·1 answer
  • Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
    14·1 answer
  • Which of the following is NOT necessary for organizing data to make it easier to sort?
    6·1 answer
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • Camila wanted to increase the readability of her company newsletter. To do this, she added _____.
    7·2 answers
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • Write about virus in five points.​
    8·1 answer
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!