1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
3 years ago
10

Technician A says you should measure the parasitic load immediately after the vehicle is turned off. Technician B says you shoul

d wait until all of the modules have gone to sleep. Who is correct?
Computers and Technology
1 answer:
mestny [16]3 years ago
8 0
B because if you think of it as a stove you wouldn't touch a stove immediately after its turned off you would want to wait until its cooled off so it doesn't burn you
You might be interested in
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
bad word bad word bad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word
topjm [15]

Answer:

men badwordbadword badwor

7 0
3 years ago
Which action will help you protect data in computer in case of an earthquake?
Dennis_Churaev [7]

Answer:

having a backup disk or storing the information in the cloud

Explanation:

7 0
3 years ago
1) Limitations imposed by scientific principles or limited resources are called?
STALIN [3.7K]
D because it has limitations or <em><u>constraints</u></em><u /> 
D again because communication technology is used for all of these things.
Sender, Message, Receiver, Feedback
It can cause the system to conform to situations.
If they don't know the properties then they could damage their equipment or the project by misusing it.
Solids, Liquids, Gasses, Plasma, and Bose-Einstein condesates

5 0
2 years ago
Prompt<br> What are hackers?
V125BC [204]

Answer:

hackers are people who get into other people's data and destroy/steal it

3 0
3 years ago
Read 2 more answers
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • Black Ops 3 For Ps4 Players Here
    7·1 answer
  • What is the output <br>this is a computer science question ​
    8·1 answer
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    12·1 answer
  • According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
    6·1 answer
  • Which does plug-and-play refer to?
    14·1 answer
  • 7. One hazard associated with driving downhill is:
    9·1 answer
  • Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
    9·1 answer
  • In how many positions are there nucleotide differences between your query sequence and the sequence of accession AY259214.1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!