1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
11

In older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of

a conductive floor such as tile or cement, NEC 404.9(B) requires the use of what kind of faceplate
Computers and Technology
2 answers:
Irina18 [472]3 years ago
8 0

Answer:

A metal faceplate with grounding means

Explanation:

metal faceplate with grounding means is required in older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of a conductive floor such as tile or cement.

Nutka1998 [239]3 years ago
7 0

Answer:

The NEC requires the use of a metallic faceplate for this situation.

Explanation:

NEC 404.9(B) requires a metal faceplate having a means for grounding to be used in older installations where there is no ground for an equipment in a metal box switch located within a conductive floor. There is however an exception which states that as long as the wiring method does not have anything to do with an equipment-grounding conductor, it is required that a snap switch that is wired and located within reach of conductive floors must have a nonmetal faceplate or protected by an interrupter.

You might be interested in
Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
abruzzese [7]

Answer:

Following are the difference to this question can be defined as follows:

Explanation:

  • In terms of projections of information into a reduced dimension group, we can consider the dimension structure of PCA and SVD technologies.  
  • In cases of a change in the length, based on consolidation, there's also a unit with dimensions.
  • When we consider that the days have been aggregated by days or the trade of a commodity can be aggregated to both the area of the dimension, accumulation can be seen with a variance of dimension.
5 0
3 years ago
Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
ozzi

Answer:

first line, that is "The bandwidth of the school’s internet connection is lower than at home" is the correct answer.

Explanation:

The network school bandwidth, speed, and list of phones can all be considerations here. In school might have a network that does not allow high MBPS or via its ISP, it might have a low bandwidth plan. It based on the router's size, frequency, and link of the firewall and gaming network, the bandwidth may be lower.

  • The Most probably, the device isn't the source but it acts in the match were caused by the link.
  • If the school requires the server for transport broadband connections, the network can slow the process through pc specifications and link to either the network.

8 0
3 years ago
What are the uses of a modem
Vlada [557]

Modem provides internet, WiFi, we can connect multiple devices to internet through modem.

Modem provides radiation of short wavelength and the transmitter in your mobile phones and computers convert those radiations into digital signals and vice-versa.

5 0
3 years ago
I need the answer to life. I cant live without my POGCHAMPS!
Ilya [14]

Answer:

Pray to God and ask him for help in life. May God bless you

Explanation:

8 0
3 years ago
Read 2 more answers
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • Consider the attack scenario given below:
    8·1 answer
  • Why is self-esteem important in self-representation
    7·1 answer
  • Write a client program that writes a struct with a privateFIFO name (call it FIFO_XXXX, where XXXX is the pid that you got from
    11·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • Hard light is usually not good for filming. True False
    11·2 answers
  • after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching wa
    15·1 answer
  • the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!