1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
4 years ago
9

What trade-offs do you think engineers make between functionality, safety and aesthetics when building a real bridge?

Computers and Technology
1 answer:
elena55 [62]4 years ago
6 0
Deciding where it should go
You might be interested in
In the Northern Hemisphere, large south-facing windows receive more total sunlight during the day and would be a part of a ___ s
9966 [12]

Answer:

Passive solar heating system

Explanation:

The goal of passive solar heating systems usually refers to the system in which the energy provided by the sun is used for heating and cooling of the living places in a house.

When sunlight falls on the house, the building elements capture the heat energy of the sun and it later releases back this heat when the sun is not there. The main objective of this system is to regulate the room temperature. It is comprised of two main elements, one is the glasses that face towards the south and a thermal mass that is used for heat absorption, storing and distribution of heat.

6 0
4 years ago
Do you want to run a listing to see files that were used by the last access date is date does not display by default which comma
FromTheMoon [43]

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "<u>Get-childitem | get-member "</u>

<h3>What is Get-childitem command?</h3>

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is <u>Get-childitem | get-member </u>

Learn more about Computer commands here: brainly.com/question/25243683

3 0
2 years ago
What is your opinion about Sophia, just a robot or human robot (explain your answer<br> with merits
Ray Of Light [21]
Who’s Sophia and pls give more context
3 0
3 years ago
Read 2 more answers
Public static double secret(int first, double second)
gizmo_the_mogwai [7]

Answer:

d. double temp;

Explanation:

Given

The above code segment

Required

Which is not part of the method definition

The method in the above program is:

public static double secret(int first, double second)

Looking through the options, we can conclude that:

d. double temp;

..... is not a part of the method

6 0
3 years ago
Based on mla guidelines, what is the correct line spacing?
Mama L [17]

Answer:

Double spaced lines are correct.

Explanation:

And for works cited use double indent

5 0
3 years ago
Other questions:
  • What does spyware do on your computer?
    8·1 answer
  • ________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwant
    7·1 answer
  • In this assignment, you are provided with working code that does the following: 1. You input a sentence (containing no more than
    14·1 answer
  • Universal Containers decided to start using salesforce for all its sales automation its current sales database has about 50 mill
    10·1 answer
  • The following equations estimate the calories burned when exercising (source): Men: Calories = ( (Age x 0.2017) — (Weight x 0.09
    11·1 answer
  • Write the one Sale method of the GroceryStore class. Method oneSale has one parameter: the name of one product (that a customer
    12·1 answer
  • Beth accidentally clicked Send on a message that was addressed to multiple recipients. She wants to use the recall option. Which
    15·1 answer
  • ______ communication channels develop outside the organizational structure and do not follow the chain of command.
    8·2 answers
  • Discuss any five factors that hinder the application of a computer in business organisations​
    15·2 answers
  • How many binary digits are in 10^100.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!