1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
3 years ago
14

To prevent injury when pulling a nail be sure the material holding the nail is

Computers and Technology
1 answer:
sattari [20]3 years ago
5 0

I think the answer may be sturdy? (I am not sure)

You might be interested in
You are setting up a RAID system in a server designed for optimum fault tolerance, accuracy, and minimal downtime. Which HDD is
REY [17]

Answer:

Any hard drive approved for use in a raid environment with 10,000 or plus rpm.

Explanation:

RAID is a technique of protecting data against hard drive failure in which same copy of data is stored on multiple drives, in an event of drive failure

data is secured on other RAID drives.

A Raid 5 system provides optimum fault tolerance , accuracy and minimal downtime.

For RAID system to work best use server grade raid drive like WD-red, Seagate Constellation. For higher speed use high RPM drives

5 0
4 years ago
Mark handles the accreditation of applications and systems within his department. He has been told by one of his technicians tha
lorasvet [3.4K]

Answer:

Changes took place

Explanation:

The system changes took place that needs to be re-accredited because, in his department, Mark performs certification of software and computer systems. Some of several specialists have advised him a device needs to be properly-accredited.

So, the system changes have taken place and need to be actually-accredited.

7 0
3 years ago
Please help me, i need help
Alchen [17]

Answer:

C or 5184000

Explanation:

i Have a MASSIVE brain

8 0
3 years ago
Read 2 more answers
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
zzz [600]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 
6 0
4 years ago
Code a Boolean expression that tests if a decimal variable named currentSales is greater than or equal to 1000 or a Boolean vari
inysia [295]

Answer:

public class ANot {

   public static void main(String[] args) {

   //Scanner in = new Scanner (System.in);

   boolean newCustomer = true;

   double currentSales =1000;

   if (newCustomer||(currentSales>=1000)){

       System.out.println("New Customer is true and current sales is greater or equal to 1000");

   }

   }

Explanation:

  1. The code is given in Java progamming language
  2. Create and initialize the variables (Boolean and double) as required by the question
  3. Use the if statement with the OR operator (||) to test both condition
3 0
3 years ago
Other questions:
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • How to learn how to use computers
    9·1 answer
  • Marjorie is a 72-year-old woman who is having difficulties with cooking and bathing. Jorge provides Marjorie with tools and tech
    12·1 answer
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • 4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
    11·1 answer
  • What are the 3 dimensions referenced when we say 3D?
    10·1 answer
  • Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
    5·1 answer
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    9·1 answer
  • What is DMTS. Explain it​
    10·2 answers
  • Which one of these is NOT an indicator that an email is spam?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!