1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
8

2 ejemplos de sistemas automáticos en la construcción civil.

Computers and Technology
1 answer:
vodomira [7]3 years ago
8 0

Answer:

ncdjjgcdbywgf ebyafbhfgcabfy bahgfdhvgafvhaef aeyhyfbhavgcjhvvhgfrau ahkgvbha,vjykabvfbhagkfvbadh avhvhav havgkv fa64gfdvwhefv nsdagcyudaf vdabncvyaukefk we7ytryuhaqgryw4tgty gyut r uytr eyuguhjayuft47rgutr7ytr  yuwqGHRUEGW7RUGU4GQATYUERGAYFUGEURGAAQ

Explanation:

You might be interested in
Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
yKpoI14uk [10]
The answer is C. Shut off the Electricity to the machine at the breaker m. hope this helps
4 0
4 years ago
Read 2 more answers
Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the tech
allochka39001 [22]

Technology allows for easy accessibility, communication and information technology could connect student and faculty computers and servers.

<h3>What is computer networking?</h3>

It is the ability of computers to communicate with one another. It makes use of a communication technology that would allow different computers to be connected to each other.

Technologies that will be used include,

  • Communication technology
  • Information technology

The different types of networking systems that can be used for communication and information include,

  • Local area network
  • Wide area network
  • Computer area network

Local Area Network (LAN):  It is a computer network that can be used in a small confined area such as a school, laboratory, office, or group of buildings.

Thererfore, technologies you would use to connect student and faculty computers, servers, multiple buildings include communication and information technology.

Learn more on technology here,

brainly.com/question/23418761

7 0
2 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
List three reasons you might use hwinfo when troubleshooting and upgrading a computer
Elza [17]

Solution:

three reasons you might use hwinfo when troubleshooting and upgrading a computer are as follows:

1) If we want to identify a hardware component with out opening the case.

2. if we want identify Features of a motherboard, video card, or processor.

3. establish benchmarks for the components in

8 0
4 years ago
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
4 years ago
Other questions:
  • How many results are shown by default when using a Top or Rare Command?
    13·1 answer
  • Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
    11·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • What's the purpose of maintaining a network of digital forensics specialists?
    14·1 answer
  • Nascar has inserted an image into his document but needs the image to appear on its own line Which option should he choose?
    12·2 answers
  • What does a computer do with what it receives from the interpreter?
    14·1 answer
  • What is cloud computing?
    9·1 answer
  • Charles wants to work for himself in the Transportation and Logistics career cluster. Which lists the jobs with the best
    7·2 answers
  • Can anyone help???
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!