1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
8

What type of engineer works on cleaning up oil spills?

Computers and Technology
2 answers:
Margaret [11]3 years ago
7 0

your answer is b. i know this because oil is a chemical.

Virty [35]3 years ago
3 0

Oil is a viscous liquid that is derived from petroleum. Since it is a chemical, a chemical engineer would work on cleaning up oil spills.

You might be interested in
Employees in your organization regularly need to print sensitive documents. The employees properly dispose of the hard copies of
Elena-2011 [213]

Answer: Regularly purge all network printers' hard drive caches.

Explanation:

4 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
2 years ago
What can you search on Microsoft Word or Powerpoint Clipart or Google (Clip art) to find more pictures like the ones below but w
elena-14-01-66 [18.8K]
Well if you put sad/mad/scared/tired/ect it should pop up with the same person.
3 0
3 years ago
WILL GIVE BRAINLIEST!!!!!!!
lisov135 [29]

Answer:

Ac

Explanation:

Ac maybe.Idk sorry.

8 0
3 years ago
Regression testing should be a normal part of integration testing because as a new module is added to the system new
nikklg [1K]
It's E) both A and B A) Control logic is invoked B) Data flow paths are established
7 0
2 years ago
Other questions:
  • An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When
    6·1 answer
  • The_provides access to the internet may also be internal​
    9·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    13·2 answers
  • Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network c
    7·1 answer
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • What is a scholary or systemic investigation or injury about a subject?
    14·1 answer
  • Which of the following is not true about VOIP?
    9·1 answer
  • Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
    14·1 answer
  • The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Pape
    15·1 answer
  • A related database stores data in the form of______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!