1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
3 years ago
7

A developer wants to build a residential/commercial project. What would be a likely initial step in determining its feasibility?

Engineering
1 answer:
elena55 [62]3 years ago
5 0
Try finding what the purpose would be of it first before determining the feasibility
You might be interested in
I need ideas for what to build because I have some spare wood.
Misha Larkins [42]

Answer:

small guitar with no strings?

Explanation:

it would be fun to make i think

6 0
3 years ago
Which contemporary jazz artist was one of the first to use a synthesizer in their recording
ivolga24 [154]

Answer:

In this era, Sun Ra was among the first of any musicians to make extensive and pioneering use of synthesizers and other various electronic keyboards; he was given a prototype Minimoog by its inventor, Robert Moog.

Explanation:

3 0
2 years ago
When _____ ,the lithium ions are removed from the_____ and added into the _____
bezimeni [28]

Answer:

b. Discharging; anode; cathode

Explanation:

When discharging , it means the battery is producing a flow electric current, the lithium ions are released from the  anode to the cathode which generates the flow of electrons from one side to another. When charging Lithium ions are released by the cathode and received by the anode.

8 0
3 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
How can I solve 23.5 million Nona meters to millimeters using no calculator because I have to show my work
lozanna [386]

Answer:

its so simple. u must mind some formulas.

Explanation:

mili->10^(-3)

micro->10^(-6)

nano->10^(-9)

so write the exact number and move "." to left or right depend question.

in this one:

23.5 is 23500000.0 nano with a default dot at the end

for turning to mili u must move the dot 6 steps to left so it will be: 23.5 milimeter.

6 0
3 years ago
Other questions:
  • Steam flows at steady state through a converging, insulated nozzle, 25 cm long and with an inlet diameter of 5 cm. At the nozzle
    11·1 answer
  • Air expands through an ideal turbine from 1 MPa, 900 K to 0.1 MPa, 500K. The inlet velocity is small compared to the exit veloci
    10·1 answer
  • In the following code, determine the values of the symbols here and there. Write the object code in hexadecimal. (Do not predict
    15·1 answer
  • Water flows at a rate of 10 gallons per minute in a new horizontal 0.75?in. diameter galvanized iron pipe. Determine the pressur
    8·1 answer
  • The displacement of a certain object is described by y(t) = 23 sin 5t, where t is measured in seconds. Compute its period and it
    9·1 answer
  • Steel riverts in aluminium drain gutters leak after two years. is it galvanic corrosion? ​
    5·1 answer
  • What is anthropology? Discuss the type of anthropology?
    5·2 answers
  • What is considered the greatest engineering achievement of the 20th century?
    10·1 answer
  • Which of the following might a cement mason or concrete finisher be responsible for? (Select all that apply).
    5·1 answer
  • X cotx expansion using maclaurins theorem.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!