1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
4 years ago
14

The ___________ section of the bid package might include information concerning provisions for water and other utilities, sanita

tion equipment, or storage areas.
Engineering
1 answer:
dexar [7]4 years ago
3 0

Answer:

Procurement Process

Explanation:

Procurement Process describes the series of activities that an organization partakes in to get products or services in order to achieve their goals. The choice of the procurement process is very important for the success of a construction project.

So during a bidding process, the procurement process is section where the organization will need to get water and other utilities, sanitation equipment or storage needed for the success of a construction project.

You might be interested in
Clarisse is an architect. What skills will she apply to integrate her visualized solutions with other aspects such as business a
Allushta [10]

Answer:Given h(x)=4x-4h(x)=4x−4, solve for xx when h(x)=0h(x)=0.

Explanation:

vGiven h(x)=4x-4h(x)=4x−4, solve for xx when h(x)=0h(x)=0.Given h(x)=4x-4h(x)=4x−4, solve for xx when h(x)=0h(x)=0.Given h(x)=4x-4h(x)=4x−4, solve for xx when h(x)=0h(x)=0.

5 0
4 years ago
The 8-mm-thick bottom of a 220-mm-diameter pan may be made from aluminum (k = 240 W/m ⋅ K) or copper (k = 390 W/m ⋅ K). When use
Artemon [7]

Answer:

For aluminum 110.53 C

For copper 110.32 C

Explanation:

Heat transmission through a plate (considering it as an infinite plate, as in omitting the effects at the borders) follows this equation:

q = \frac{k * A * (th - tc)}{d}

Where

q: heat transferred

k: conduction coeficient

A: surface area

th: hot temperature

tc: cold temperature

d: thickness of the plate

Rearranging the terms:

d * q = k * A * (th - tc)

\frac{d * q}{k * A} = th - tc

th = \frac{d * q}{k * A} + tc

The surface area is:

A = \frac{\pi * d^2}{4}

A = \frac{\pi * 0.22^2}{4} = 0.038 m^2

If the pan is aluminum:

th = \frac{0.008 * 600}{240 * 0.038} + 110 = 110.53 C

If the pan is copper:

th = \frac{0.008 * 600}{390 * 0.038} + 110 = 110.32 C

7 0
4 years ago
Water is flowing in a pipe. Which is the correct statement about the effect of an increase in the Reynolds number of the flow:
shepuryov [24]

Answer:

c.if the flow is laminar it could become turbulent.

Explanation:

The Reynolds number (Re) is a dimensionless quantity used to help predict flow patterns in different fluid flow situations. At low Reynolds numbers of below 2300 flows tend to be dominated by laminar, while at high Reynolds numbers above 4000, turbulence results from differences in the fluid's speed and direction. In between these values is the transition region of flow.

In practice, fluid flow is generally chaotic, and very small changes to shape and surface roughness of bounding surfaces can result in very different flows.

4 0
4 years ago
The Canadair CL-215T amphibious aircraft is specially designed to fight fires. It is the only production aircraft that can scoop
ioda

Answer:

Determine the added thrust required during water scooping, as a function of aircraft speed, for a reasonable range of speeds.= 132.26∪

Explanation:

check attached files for explanation

6 0
3 years ago
SSL/TLS is used for ________.
Nana76 [90]

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

4 0
4 years ago
Other questions:
  • Two sections, A and B, are 0.5 km apart along a 0.05 m diameter rough concrete pipe. A is 115 m higher than B, the water tempera
    12·1 answer
  • A charge of +2.00 μC is at the origin and a charge of –3.00 μC is on the y axis at y = 40.0 cm . (a) What is the potential at po
    5·1 answer
  • A saturated 1.5 ft3 clay sample has a natural water content of 25%, shrinkage limit (SL) of 12% and a specific gravity (GS) of 2
    11·1 answer
  • Determine how much concrete you will need for a slab which is 50 feet by 30 feet wide and 1 foot thick
    15·1 answer
  • What are the use of logic gates in the field of robotics?
    10·1 answer
  • The preparation of a formal SEMP is usually a required portion of a contractor’s proposal for a competitive system development p
    8·1 answer
  • What regulates the car engines temperature
    10·2 answers
  • This is the top part of the picture. I need someone to put the correct letter by the word !
    5·2 answers
  • 8. What is the purpose of the 300 Log?
    12·1 answer
  • 5. Which of the following is false about onStep?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!