1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
4 years ago
11

Can you get shocked from a breaker box?

Computers and Technology
1 answer:
Mashcka [7]4 years ago
4 0
I dont think it would, but maybe you should Google it just in case.
You might be interested in
2. Which company was first able to send a text? (Verizon, AT&T, Cricket???)
zheka24 [161]

Answer:

I would say Nokia

Explanation:

Nolia was the first to create an SMS text message in 1993.

sorry if I am wrong :c

3 0
3 years ago
A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
mariarad [96]

Answer:

datatable

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following statements applies to a proprietary software license? a. Purchased from a vendor and gives you the right
Semmy [17]

Answer: a)Purchased from a vendor and gives you the right to use the software but is not yours to own.

Explanation: Proprietary software is the software that can be used by the user but it has  copyright of the vendor/holder in any case.There are some certain condition under which the user can use this software.The distribution of the software is not permitted in this case. No modification or manipulation can be done by the user.

Other options are incorrect because it is not free as its purchased from vendor ,not freely available rather guided by owner and can be used over certain period of time.Thus , the correct option is option(a).

3 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
Veronika [31]

Answer:

3.59 minutes

Explanation:

We solve this question using z score formula

Using Excel

Z-SCORE= (DataPoint-AVERAGE(DataSet))/STDEV(DataSet)

IN EXCEL,

AVERAGE, an excel function that calculates the Average of data set

STDEV.S: calculates the standard deviation while treating the data as a ‘sample’ of a population.

STDEV.P: This function calculates the standard deviation while treating the data as the entire population.

Z score formula = x - μ/σ

x = ?? μ = 2.5 minutes σ = 0.5 minutes

We are asked : If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x?

Hence, Longer than = Greater than =

100 - 1.5%

= 100 - 0.015

= 0.985 ( 98.5%)

Using Excel we calculate = z score for 98.5 percentile

= 2.1701

Z score = x - μ/σ

2.1701 = x - 2.5/0.5

2.1701 × 0.5 = x - 2.5

1.08505 = x - 2.5

x = 1.08505 + 2.5

x = 3.58505

Approximately to 2 decimal places = 3.59 minutes

Therefore, 1.5% of the callers are put on hold for longer than 3.59 minutes.

8 0
3 years ago
Other questions:
  • Project managers have the overall responsibility for planning, executing, and completing a project. True False
    7·2 answers
  • What the benefit is of folders when working with files
    13·2 answers
  • COMPUTER FUNDIMENTAL HELP 15 POINTS!! RESEND IT
    7·2 answers
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • Which of the following does not illustrate the survey method of choosing a speech topic?
    6·2 answers
  • The TCP/IP ____ layer, sometimes called the Internet layer, is roughly equivalent to OSI's network layer.
    7·1 answer
  • In the Mouse Properties window, you can_____. A. change the color of the pointer.
    9·2 answers
  • How can i change my age on my profile here bc i am 13 but i accidenlty put 2005 instead of 2006 no need to rush to answer just w
    9·2 answers
  • Unscramble dki-----------------------------------------------------------------------...........
    8·2 answers
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!