1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
4 years ago
5

Technician A says that the excessive length of a heater hose is intended to protect the heater core from undue stress. Technicia

n B says that excessive wear adds to the length of a heater hose, and a replacement heater hose should be roughly three to four inches shorter than its predecessor. Who is correct? A. Technician B B. Both Technicians A and B C. Neither Technicians A nor B D. Technician A
Computers and Technology
1 answer:
hammer [34]4 years ago
6 0
It is both true that <span>Technician A says that the excessive length of a heater hose is intended to protect the heater core from undue stress. Technician B says that excessive wear adds to the length of a heater hose, and a replacement heater hose should be roughly three to four inches shorter than its predecessor.  So the asnwer is letter B.</span>
You might be interested in
How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
Lana71 [14]
How efficient well if we are transmitting 6bits and we need 10 to transmit the 6 bits that would be 6/10 = .6 = 60% efficient.
7 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Here we have a program which is calling the subtract function to calculate the difference between two numbers. The value from th
statuscvo [17]

Answer:

See explanation

Explanation:

Given

The above program that subtracts two numbers and returns the result

Required

Modify the source code to run perfectly

When the given program is tested, it displays

<em>4 minus 10 equals -6 </em>

<em></em>

<em>Which is different from the expected output of</em>

<em>10 minus 4 equals 6 </em>

<em></em>

Modify

<em>solution = minuend-subtrahend </em>

<em>to</em>

<em>solution = subtrahend  - minuend</em>

<em></em>

And that does it.

8 0
3 years ago
What makes it possible for e-mail to be sent and received on a wide variety of devices, including cell phones, PDAs, laptops, an
Usimov [2.4K]

Answer:

Compatibility.

Explanation:

Email or electronic mail is a messaging system that allows for transmission of digital or electronic mails to computers within and to other networks through the internet.

Email applications are web based applications and are hosted on servers. The POP (post office protocol) and IMAP (internet messaging access protocol) are used to message the mails sent to a client on a server. The application is written with standards and protocols to ensure compatibility in all types of device form factor, so an email can be view in a laptops, smartphones etc.

4 0
3 years ago
What is the purpose of fcc?
melamori03 [73]
<span> The Bureaus and the Office of Engineering and Technology process applications for licenses and other filings, analyze complaints, conduct investigations, develop and implement regulatory programs and participate in hearings, among other things. </span>
3 0
3 years ago
Other questions:
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • You are troubleshooting an IEEE 802.11 wireless client device that cannot connect to the wireless network. You notice the client
    14·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
    15·1 answer
  • I just downloaded an update for my laptop. Now, it doesn't give me a notification when the battery is low, and it just shuts off
    6·1 answer
  • The question "How is traffic affected by fans leaving the stadium?" is related to which of the following?
    10·1 answer
  • The primary reason for a company to outsource jobs is to
    8·2 answers
  • Line 9 and 10
    15·1 answer
  • Jorge, a sports statistician for soccer, has kept track of how many shots-on-goal each player on a team made in each game. This
    9·1 answer
  • In java complete a program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!