1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
4 years ago
6

Why shouldn't a server use a glass to scoop ice?

Computers and Technology
2 answers:
natali 33 [55]4 years ago
7 0
A server shouldn't use a glass to scoop ice as the glass may break. This is due to the potential temperature difference between the glass (which may be room temperature or hotter if it is taken from a dishwasher), and the cold ice. Any existent hairline fractures in the glass may then expand and crack, whereby the smashed pieces of glass could then land in the client's food, table or lap, potentially causing injury to the person. 
vlabodo [156]4 years ago
6 0
The glass may break or chip.
You might be interested in
A draft has the following:<br> Plot<br> Details<br> Transition Words<br> Important events in order
exis [7]
What do you have to do?
7 0
3 years ago
If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
Nikolay [14]

If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill.

<h3>What is telnet used for?</h3>

Telnet is known to be a kind of a network protocol that is said to be used to virtually look into a computer and to give a two-way, working hand in hand and text-based communication channel that exist between two machines.

Note that, If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill because it does not apply in any way.

Learn more about telnet from

brainly.com/question/23640188

#SPJ1

4 0
2 years ago
Which of the following would you use to search a table in Excel?
snow_tiger [21]

Answer:

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are empty</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNT</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTA</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANK</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANKd. COUNTVALUES</em>

3 0
3 years ago
Read 2 more answers
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
3 years ago
Other questions:
  • The first digital keyboard was the DX-7, introduced by the Yamaha company in 1983.
    15·1 answer
  • The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
    6·1 answer
  • If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
    14·1 answer
  • If a function needs to return more than one value, as a rule of good programming style, you should change it to a(n) ___________
    6·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • Which of the following is NOT necessary for organizing data to make it easier to sort?
    6·1 answer
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • The ____ method returns an integer that represents the location of the substring within the string.
    13·1 answer
  • You can fit more RAW files on a memory card than JPEG files. true or false
    10·1 answer
  • ACTIVITY NI MATCHING TYPE Directions: Match Column A with Column B. Write the letter of the correct answer on the space provided
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!