1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
9

Technician A says that a system should be recharged with refrigerant until the condenser temperature is equal to the ambient tem

perature plus 100°F. Technician B says that a system should be recharged with the type and amount of refrigerant found on the vehicle's under-hood sticker. Who is correct?
Computers and Technology
1 answer:
Reptile [31]3 years ago
6 0

Answer:

Technician B

Explanation:

The vehicle will always come with a sticker placed under the hood of the AC unit. This sticker has information like the amount of ounces or pounds required for a complete charge. The car’s gauge will state the psi with most gauges having a color bar on the face the appropriate pressure.

You might be interested in
What is the missing line?
gregori [183]

Correct question:

What is the missing line?

>>> myDeque = deque('math')

>>> myDeque

deque(['m', 'a', 't'])

Answer:

myDeque.pop()

Explanation:

The double ended queue, deque found in the python collection module is very similar to a python list and can perform operations such as delete items, append and so on.

In the program written above, the missing line is the myDeque.pop() as the pop() method is used to delete items in the created list from the right end of the list. Hence, the 'h' at the right end is deleted and we have the output deque(['m', 'a', 't'])

myDeque.popleft () deletes items from the right.

4 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
Alexandra [31]

An SMS is a short code that is used by businesses to opt in consumers to their SMS programs, and then used to send text message coupons, offers, promotions to those customers that had previously opted.

Explanation:

When Someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ringtone. The tower gives your phone a pair of voice channel frequencies to use for the call.

The MMS and other data driven services works on the fundamental voice network and is based on the big three GSM, CDMA and TDMA network technologies. The SMS allows text messages of 160 characters (letters, numbers and symbols).

The text messaging is an act of composing and sending electronic messages consist of alphabetic and numeric character between two or more more mobile devices.

7 0
4 years ago
Read 2 more answers
in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
DENIUS [597]

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

3 0
3 years ago
Clicking a _____ takes you to a webpage that no longer exists or has been moved.
Ne4ueva [31]

Answer: Clicking a __<u>dead link</u>___ takes you to a webpage that no longer exists or has been moved.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Jose would like to know about his uncle's death. He feels his dad is avoiding the subject for some reason. Identify what Jose co
    5·1 answer
  • how do I comment on answers? there's one answer I'm confused about but I don't know how to comment on it
    7·2 answers
  • What type of tool would be used to tighten a nut or bolt with an exact amount of twisting force?
    7·1 answer
  • Declare a structure whose tag name is Server and that contains the following fields: manufacturer, a string, model and serialnum
    12·1 answer
  • You are an ISP. For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there
    6·1 answer
  • What is the difference between cybercrime and cyber security?
    12·1 answer
  • Choose the correct option below:Part A1. WAN link 2. Client 3. Server 4. Hub 5. Switch 6. Router 7. Media Part BA. This serves u
    9·1 answer
  • What does place value mean with binary?
    6·1 answer
  • Write a html5 code to display 5 friends both an orderd and unordered list .
    12·1 answer
  • Aisha designed a web site for her school FBLA club. Which item should Aisha consider for improved responsive design?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!