1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
8

What type of engineer works on cleaning up oil spills?

Computers and Technology
2 answers:
Margaret [11]3 years ago
7 0

your answer is b. i know this because oil is a chemical.

Virty [35]3 years ago
3 0

Oil is a viscous liquid that is derived from petroleum. Since it is a chemical, a chemical engineer would work on cleaning up oil spills.

You might be interested in
When you select an object in the Visual Studio Designer, the object's size, color, text, and other characteristics are displayed
harina [27]

Answer:

the main window if that`s not correct sorry

Explanation:

3 0
3 years ago
The windows logon process has unexpectedly terminated
dusya [7]

Answer

Windows corrupted

Explanation:

Try buying a new windows or resetting your laptop/pc

or your service failed to register/start

7 0
3 years ago
If you are an expert in your field, the purpose of your presentation will remain the same for all types of presentations. True o
Tomtit [17]
It's false because u can't keep yourself on one side all the time u have to change the type u r talking about
4 0
4 years ago
Read 2 more answers
Look at the following assignment statements: food1 = "water" food2 = "melon" What is the correct way to concatenate the strings?
Ilia_Sergeevich [38]

Programming language in R studio or R, food1 = "Water" food2 = "Melon"

Concatenate = paste("food1","food2"), will give  "Water Melon". In excel Water in range("B2"), Melon in range("B3"), use =CONCATENATE(B2, " ", C2) it gives Water Melon.

Explanation:

  • R studio is analytical tool which comes from programming S language.
  • We need 3 variable Food1,Food2 and Concatenate in R studio.
  • Food1 = "Water" inverted commas mean it is character.
  • Food2 = "Melon" inverted commas mean it is a character.
  • "=" gives a variable notification.
  • Concatenate is a variable which we use function paste .
  • Concatenate = paste(food1,food2) result "water melon"
  • paste(..., sep = "" , collapse = Null)
  • It is function from R.
  • Excel Water in B2 and Melon in C2 use the formula concatenate.
  • =CONCATENATE(B2, " ",C2) in between commas means space.
5 0
3 years ago
Which type of attack cripples the network and prevents legitimate users from accessing network resources
yaroslaw [1]

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

6 0
3 years ago
Other questions:
  • Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se
    8·1 answer
  • What difference between plagiarism and fair use?
    14·1 answer
  • In addition to the four primary computer operations, today's computers almost always perform ____ functions.
    7·1 answer
  • One method of encoding messages is known as the "expanding square code". this method encodes message by placing the character of
    10·1 answer
  • Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
    7·1 answer
  • What is block chain?
    5·2 answers
  • Which statement best describes what happens when a computer starts?
    9·1 answer
  • Write the pseudocode for a program that will process attendance records of CA students. The students attend college five days a
    13·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
  • Which tool is often used by devops to facilitate the development, testing, and deployment of new software?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!