1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
12

Which of the following is not a component of the programming phase of facility construction? deciding what to build examining sp

ace, cost, and other criteria designing the facility with architects deciding what events will be held at the facility and addressing capacity and amenities issues deciding the number and location of food and beverage preparation and sales areas
Computers and Technology
1 answer:
Anika [276]3 years ago
4 0

Answer: designing the facility with architects.

Explanation: The programming phase of a facility construction has nothing to do with the architectural design of the facility. The programming phase usually involves ; Determining the needs of intended or impending users, estimated construction cost, required area for the project. The programming phase may involve individual or joint questioning or fact finding from the intended occupants or user group to determine their needs in terms of systems and infrastructure, security and so on. It also gets intended occupants informed on the features, use and design of the intended project. It also examines the effect of the project on structures previously existing in the environment.

You might be interested in
Rachel wants to make sure that she uses effective communication skills at work. Which of the following is an example of somethin
BartSMP [9]

dont use slang or words like lol

5 0
3 years ago
Read 2 more answers
JAVA PROGRAMMING
VashaNatasha [74]

Answer:

See explaination

Explanation:

import java.util.Scanner;

public class GtldValidation {

public static void main (String [ ] args) {

Scanner scnr = new Scanner(System.in);

// Define the list of valid core gTLDs

String [ ] validCoreGtld = { ".com", ".net", ".org", ".info" };

// FIXME: Define an array named validRestrictedGtld that has the names

// of the restricted domains, .biz, .name, and .pro

String [] validRestrictedGtld={".biz",".name",".pro"};

String inputName = "";

String searchName = "";

String theGtld = "";

boolean isValidDomainName = false;

boolean isCoreGtld = false;

boolean isRestrictedGtld = false;

int periodCounter = 0;

int periodPosition = 0;

int i = 0;

System.out.println("\nEnter the next domain name (<Enter> to exit): ");

inputName = scnr.nextLine();

while (inputName.length() > 0) {

searchName = inputName.toLowerCase();

isValidDomainName = false;

isCoreGtld = false;

isRestrictedGtld = false;

// Count the number of periods in the domain name

periodCounter = 0;

for (i = 0; i < searchName.length(); ++i) {

if (searchName.charAt(i) == '.') {

++periodCounter;

periodPosition = i;

}

}

// If there is exactly one period that is not at the start

// or end of searchName, check if the TLD is a core gTLD or a restricted gTLD

if ((periodCounter == 1) &&

(searchName.charAt(0) != '.') &&

(searchName.charAt(searchName.length() - 1) != '.')) {

isValidDomainName = true;

}

if (isValidDomainName) {

// Extract the Top-level Domain name starting at the period's position. Ex:

// If searchName = "example.com", the next statement extracts ".com"

theGtld = searchName.substring(periodPosition);

i = 0;

while ((i < validCoreGtld.length) && (!isCoreGtld)) {

if(theGtld.equals(validCoreGtld[i])) {

isCoreGtld = true;

}

else {

++i;

}

}

// FIXME: Check to see if the gTLD is not a core gTLD. If it is not,

// check to see whether the gTLD is a valid restricted gTLD.

// If it is, set isRestrictedGtld to true

}

System.out.print("\"" + inputName + "\" ");

if (isValidDomainName) {

System.out.print("is a valid domain name and ");

if (isCoreGtld) {

System.out.println("has a core gTLD of \"" + theGtld + "\".");

}

else if (isRestrictedGtld) {

System.out.println("has a restricted gTLD of \"" + theGtld + "\".");

}

else {

System.out.println("does not have a core gTLD."); // FIXME update message

}

}

else {

System.out.println("is not a valid domain name.");

}

System.out.println("\nEnter the next domain name (<Enter> to exit): ");

inputName = scnr.nextLine();

}

return;

}

}

8 0
3 years ago
The java compiler is able to find all programmer errors.
Troyanec [42]
No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.
5 0
3 years ago
1.Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet
konstantin123 [22]

Answer:

16 subnets and 14 hosts assignable IP addresses.

Explanation:

Computer networking is the interconnection and intercommunication of computer devices. These computer devices can be connected using cables or wirelessly. All devices in a network must have an IP address.

Subnetting a network is a process of preventing the waste of IP addresses for the purpose of security and cost. IP4 addresses are 32 bits in size (4 octets) and the host and subnet size is dependant on the host and network bit configuration.

The IP address 200.245.10.150/28 is a class A network address but subnetted to borrow four bits from the fourth octet to produce 16 subnets (2 ^ 4 bits borrowed) and 14 host IP addresses (2^ 4 bits remaining in the fourth octet - 2, which is the network and broadcast addresses).

3 0
3 years ago
Jeff types a sentence She wore a new dress yesterday. He erroneously typed w instead of e in the word dress. What is the accurac
antoniya [11.8K]
96 i believe i'm not too certain on this one
6 0
3 years ago
Read 2 more answers
Other questions:
  • The purpose of the ________ element is to describe the contents of a table.
    15·1 answer
  • You need to set up a network that needs to span multibple buildings. For this reason, you want to use the cabling that supports
    10·1 answer
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    6·1 answer
  • Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
    14·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    7·1 answer
  • Does anyone know any nitro type hack??
    13·2 answers
  • Provide examples of the cost of quality based on your own experiences
    14·1 answer
  • "Explain the functionality of the different layers found in the network protocol stack of an operating system such as Linux"
    7·1 answer
  • Where do players resurrect if they have been destroyed in a game?
    13·1 answer
  • The best way to take control of the first page of Google is to
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!