1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
4 years ago
9

Determine if the situation below is a safe practice: Julia needs to hang some industrial shelvinv, so she carefully selects the

correct drill bits for the electrical drill before attempting to screw the shelves into the wall
Computers and Technology
2 answers:
hichkok12 [17]4 years ago
7 0
I think Julia did good.











Its safe 
Anika [276]4 years ago
5 0

Answer

The situation in a safe practice

Explanation

When drilling, first select the proper bit. The manufacturer’s manual contains information on the drilling attachment thus you should first read it if new to the drilling bit. This should be followed by selecting the suitable bit per size of drill and work being performed. Seal and tighten the bit in the chunk that turns true. For continuous operations and large pieces, use the auxiliary handle.


You might be interested in
For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
Vladimir [108]

Answer:

hi your question lacks the necessary matrices attached to the answer is the complete question

1024 bytes

Explanation:

A) The minimum size of the cache to take advantage of blocked execution

 The minimum size of the cache is approximately 1 kilo bytes

There are 128 elements( 64 * 2 ) in the preceding simple implementation and this because there are two matrices and every matrix contains 64 elements .

note:  8 bytes is been occupied by every element therefore the minimum size of the cache to take advantage of blocked execution

= number of elements * number of bytes

= 128 * 8 = 1024 bytes ≈ 1 kilobytes

7 0
3 years ago
Consider a network of 8 routers connected together to provide more than one path of connectivity between host A and host B at tw
ser-zykov [4K]

Answer:

Option C is the correct option to the following question

Explanation:

Because there are not any limits is required of sending data and packets between host A and host B by the routers and the router permit more than one paths between the hosts for the establishment of the connectivity st two distinct locations in the routing protocol. The router transmits the packets between the hosts that is produced by link-state protocol.

5 0
3 years ago
Acquiring new knowledge and skills at every stage of life:
Artist 52 [7]

d. lifelong learning

6 0
1 year ago
Read 2 more answers
A(n) ____ describes the structure, content, and access controls of a physical data store or database.
kirill115 [55]

A <u>schema </u>describes the structure, content, and access controls of a physical data store or database.

<h3>What is the kind of database that stores data in a different physical location?</h3>

Distributed databases are that are distributed across several physical locations. In distributed databases, the data are placed where they are used most often, but the whole database is available to each licensed user.

<h3>What is the structure of database management system?</h3>

The database system is separated into three components: Query Processor, Storage Manager, and Disk Storage.

To learn more about Distributed databases, refer

brainly.com/question/28236247

#SPJ4

Complete Question is ,

a. relation

b. DBMS

c. schema

d. attribute

6 0
2 years ago
Match the technology with the appropriate task.
Fiesta28 [93]

Answer:

the number order is

1

5

2

4

3

Explanation:

I am sure it is correct. Thanks :)

3 0
3 years ago
Other questions:
  • Write a method that will receive 2 numbers as parameters and will return a string containing the pattern based on those two numb
    10·1 answer
  • When you want to avoid sending email that a recipient may feel their privacy has been invaded, how would you fill in the (To) bo
    13·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • Which of the following is NOT considered a step in the problem solving process. A Try B Discover C Prepare D Define
    12·1 answer
  • Plz help<br> What is an ASCII?
    10·2 answers
  • We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination
    12·1 answer
  • In the Microsoft Excel spreadsheet how many choices are possible when using a single IF statement​
    9·1 answer
  • Wyatt has a database to keep track of his enormous collection of videos. How can Wyatt find the details for the game Lost on Mar
    11·2 answers
  • Which 1947 Invention paved the way for the Digital Revolution?
    12·2 answers
  • What kind of AR target category makes sense for a playing card with a picture on it?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!