1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
11

3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk

away. As you approach the bridge, you notice interlocking metal joints that join the bridge to the road. What are these joints called? What purpose do they serve? (4 points)
Computers and Technology
1 answer:
Lelechka [254]3 years ago
6 0
The correct answer is known as the "Expansion Joint".

An Expansion joint or also referred to as the movement joint, it is an assembly made to safely absorb the temperature-induced expansion between two structures and the contraction of the construction materials used for the structure. The joints also absorbs vibrations, and to hold parts together even though stressors are present, stressors can be known characterized as the strong winds, seismic activities and temperature changes in the area.
You might be interested in
How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
Scorpion4ik [409]
It allows for more accurate sizing of networks.
4 0
3 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
What will the following code display? #include using namespace std; void doSomething(int); int main() { int x{2}; cout <<
Leno4ka [110]

Answer:

The code will display the following on the screen:-

2

0

2

Explanation:

The output is like this because x{2} assigns the value 2 to the integer x.First the value of x is printed on the screen that is 2 and that newline is used to go to the next line.After that function is called doSomething with x passed as the argument. doSomething function assigns the value zero to the variable passed and prints it on the screen.So the next line is 0.Since x is passed by value so no changes will appear in the original argument.Hence the last line printed is 2.

8 0
2 years ago
Pls answer will give brainlest dont answer if you dont know Upload your 300-word essay containing the following: the definition
Rainbow [258]

Answer: oh hello human :) also PLEASE DONT KILL ME I’m answering this because the question was already answered already on another post

6 0
2 years ago
In Microsoft word,when you highlight existing text you want to replace ,you’re in?
Lerok [7]

In Microsoft Word, when you highlight existing text you want to replace, you are in overtype or typeover mode. However, this may also be the case when you are in the Find and Replace tool, where you will type in all the exact phrases or words that will eventually be highlighted and then be replaced in just one click.

5 0
3 years ago
Other questions:
  • C programming:
    10·1 answer
  • If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
    13·1 answer
  • The program processes the command line arguments. The arguments indicate which signals to catch:________. A. The program emits a
    10·1 answer
  • Read first a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata to writ
    6·1 answer
  • What does the launcher button do? (From Microsoft Word 2016)
    6·1 answer
  • What does a page break do?
    13·1 answer
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • Which of the following aspects of a computer is responsible for making sense of input? processing output memory storage
    14·2 answers
  • Instructions
    8·1 answer
  • The _____ layer addresses how the software will execute on specific computers and networks.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!