1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
12

What is civil construction?

Computers and Technology
1 answer:
sasho [114]3 years ago
6 0
Civil construction is any construction in a society that belongs to the group of core infrastructure such as <span>pipelines, telecommunications, sewers, water treatment systems, highways, roads, bridges etc.</span>
You might be interested in
How do you get a blank business card template in word?
denis23 [38]

Answer:

I dont think you'll get it on word but try Canva thats where i designed my buisness cards

Explanation:

3 0
3 years ago
Which statement about tuition is the most accurate?
Kisachek [45]

public colleges are cheaper for in-state residents

5 0
4 years ago
Read 2 more answers
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a ve
Igoryamba

Explanation:

On October 31, around twelve o'clock at night, the lights were dull. It was Siberian cold and I was walking painfully under the whitish lighting of a lamppost and the retro neon lights of a convenience store in a neighborhood that was buzzing when I went to buy meat. buildings, grayish in this half-light, crumbled under the weight of sleep, while the neighborhood was still open. Its decoration was particularly macabre in tone: synthetic but very sticky spider webs adorned the porches of the terraces, pumpkin ornaments are exhibited like works of art, ... Some pushed the macabre by hanging mannequins made up in corpses. At the entrance to the neighborhood, I found the body of its owner stabbed. Frozen in place, I wondered what else awaits me. My heart was pounding, feeling a shiver of anguish. When I was removing the phone from my pocket to call my police friends, my hands were clenched in fear. An investigation was carried out to find out the causes of death. Also, I went with them so they take my words. Hopefully the murderer will be arrested to put an end to this sybilinous crime.

4 0
3 years ago
¿como influye la tecnologia en su vida cotidiana?
ANEK [815]

Answer:

La tecnología afecta la forma en que hablamos, aprendemos y pensamos. También nos hemos vuelto dependientes de la tecnología.

Explanation:

3 0
3 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • When doing black and white photography, which file format should you use if possible? JPEG TIFF PNG RAW
    11·2 answers
  • The crash rate per mile is ..
    12·2 answers
  • Josh wants to sign up for a gaming website. It will allow him to download games. He can’t find a privacy policy. Should he join
    9·2 answers
  • Write any four difference between email and effects​
    14·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • You are supposed to do a report on something that interests you. You decided to do a report on dogs. As you research, you take n
    14·1 answer
  • Which web source citations are formatted correctly? check all that apply.
    14·1 answer
  • A(n) _____ is a data validation rule that should be applied to mandatory data items.
    15·1 answer
  • 1-List some applications appropriate for each of the display technologies: raster refresh systems,plasma panels, and LCDs.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!