1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
11

The OSI is a reference system that is used by most types of technicians EXCEPT _____.

Computers and Technology
2 answers:
melisa1 [442]3 years ago
7 0

Answer:

here are the choices:

engineers

all technicians have agreed to use the OSI as a standard reference

computer scientists

technical illustrators

Explanation:

Zanzabum3 years ago
4 0

The army doesn't use it, so that might be the answer, if it isn't sorry but I don't what else it would be.

You might be interested in
An ellipse (three dots) following a menu item indicates that
Mariulka [41]

Answer:

Correct answer is

clicking on item will display a dailogbox/ more options

Explanation:

In web site menus have limited space.To add all items menus are grouped in categories and only category names are shown while there subsets are displayed in a drop down list upon hovering on them.

Some time designer user three dot indication which indicates there are more options available in a hidden side bar or dialog menu which opens upon clicking the ellipse.

3 0
4 years ago
Read 2 more answers
Question 5 of 5
Archy [21]

<u>Answer:</u>

<em>Sewage treatment Programs </em>

<u>Explanation:</u>

Sewage treatment programs are the right choice <em>because these are the source to create germs and if we understand how to be clean, most of the disease is avoided. </em>

<em>Drug regulation:</em> It is nothing but the continuous treatment of prolonged disease where pills needs to be taken regularly to protect patients from death or to avoid disease become more severe.

<em>Physical fitness campaign:</em> This concentrate on to how to keep bod fit through exercise and it does not deal with hygiene.

<em>Nutrition Education:</em> It’s a kind of protection mechanism where in-take of food is really concentrated to fight against germs.

5 0
4 years ago
According to the rules of economics, all resources arein their supply. The wants and needs of people are. The more scarce a reso
pshichka [43]

To make choices/decisions.

The principle of scarcity forces people to make choices or decisions about how to allocate resources efficiently. These choices are made to satisfy basic needs and as much additional wants as possible. This principle of Scarcity in economics further states that, limited goods and services are available to meet unlimited wants. Even resources considered plenty and free in monetary, somehow, are scarce in some sense. It is in the capacity of an individual to buy some or all commodities as per the available resources with that individual.

6 0
4 years ago
Read 2 more answers
Some Web sites impose certain rules for passwords. Write a function that checkswhether a string is a valid password. Suppose the
Levart [38]

Answer:

def check_password(pwd):

   c=0

   d=0

   for i in pwd:

       if (i>='a' and i<='z') or (i>='A' and i<='Z'):

           c+=1

       elif i>='0' and i<='9':

           d+=1

           c+=1

   if len(pwd)==c and d>=2 and len(pwd)>=8:

       print("valid password")

   else:

       print("Invalid password")

 

ps=input("Enter password for checking : ")

check_password(ps)

Explanation:

  • Loop through the password and check if it contains any alphabet.
  • Increment the counter if it contains any alphabet.
  • If it contains a number, increment both c and d variables.
  • Finally display the relevant message.
6 0
3 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
Other questions:
  • How does hardware differ from software
    9·1 answer
  • Email applications can either be local email client programs or web-based applications. Which application is an example of a loc
    13·2 answers
  • Define the missing method. licenseNum is created as: (100000 * customID) + licenseYear. Sample output: Dog license: 77702014
    14·1 answer
  • In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as wel
    7·1 answer
  • A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located
    14·2 answers
  • Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn c
    14·1 answer
  • You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You wa
    10·2 answers
  • In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the r
    7·1 answer
  • 1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path
    14·1 answer
  • True or False? Popular sites are always mean accurate
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!