1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
5

During the process of Refrigerant Recovery, the Technician should operate the recovery unit until the system pressure has been r

educed to a vacuum, then ______________.
A. Immediately close the valve in the service lines and remove the lines from the vehicle

B. Immediately close the valve in the service line and charge the system

C. *Recover to a vacuum of 4 inches of mercury, isolate the system and wait 5 minutes to see that the system holds the vaccum

D. Open the shut­off valves which must be located within 4 inches of the service ends
Computers and Technology
1 answer:
Scrat [10]3 years ago
3 0

Answer:

B. Immediately close the valve in the service line and charge the system

Explanation:

The precaution should be taken prior to recovering refrigerant from a chiller are:

1) Immediately disconnect the recycling or recovery equipment and open the system for service.

2) Wait for at least a few minutes to see if the system pressure rises, indicating that there is still refrigerant in liquid form or in the oil.

3) Immediately break the vacuum with nitrogen and open the system for service.

You might be interested in
A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
Phantasy [73]

Answer:

The correct option is C. The user does not have a valid product license key. Both the OS installed on the bare metal (that the host) and the client OS must have a valid license key.

Explanation:

There is a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V.

This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well.

If you need to do testing as a software developer, or simply want an additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.

To have the Hyper-V feature on your PC, you'll need to meet some basic requirements like your computer will need 4GB of RAM with a 64-bit processor that has Second Level Address Translation (SLAT).

Many PCs on the market have this feature, while many PC BIOSes have virtualization features turned on by default, your PC might not.

As BIOS menu layouts are not universal, you'll want to consult your PC BIOS documentation as to where the feature is located in your firmware setup and what it is called.

a.   Windows 8.1 does not support Type 2 hypervisors.

 This option is wrong. All 64-bit Windows 8.1 OS except for the Home version supports hypervisors type 2 as well as type 1

b.   The motherboard does not support hardware-assisted virtualization.

Most of the PC that can run Windows 8.1 has visualization, all that is needed is to have it enabled if it was it enabled by default in the BIOS

c.   The user does not have a valid product license key.

This is the correct answer. For you to successfully install visualization software on Windows 8.1, both the host OS and the client OS must have a valid product key

d. The system is incompatible with Type 1 hypervisors.

This option is wrong. The Windows 8.1 OS does not only support the installation of visualization software, it came with its hypervisor called Hyper-V.

7 0
3 years ago
The merge and center
elena-s [515]

Answer:

True

Explanation:

Merge & Center is a feature in excel that combines multiple cells and centers the contents of the first cell. You can merge columns and rows too.

8 0
3 years ago
The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
Liula [17]

Answer:

"Cross-training " seems to be the right response.

Explanation:

  • Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization.
  • This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.
7 0
3 years ago
When you see a blank pointer this means you can drag the row or column border to change height or width
Orlov [11]
No, you would see arrows pointing in opposite directions <--> like so
7 0
3 years ago
Brake fluid is made up of a chemical that:
TEA [102]

A) IS MOSTLY JUST ENGINE Oil.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What item on a business card is generally the most prominent?
    13·2 answers
  • Wap-enabled devices require a ________, a special web browser that has all the features of computer-based browsers but is simpli
    11·1 answer
  • A microphone, a track ball, and speakers are all examples of ____. hardware software
    6·2 answers
  • Type an SQL statement into the Record Source property of the report. The statement should select all fields (*) for employees wi
    5·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • A social cause is: O A. when one person protests without the support of others. B. something that not many citizens think or car
    8·1 answer
  • Which of the following best explains what happens when a new device is connected to the Internet?
    9·1 answer
  • Please please help I don’t understand this
    6·1 answer
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!