1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
15

Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a gu

ild?
During the Middle Ages, a family worked in a trade for generations, with fathers training sons and passing knowledge along bloodlines.
Masons learned how to carve elaborate gargoyles; glaziers made intricate stained-glass windows. These skilled workers were organized into
guilds, and on a construction site, guild workers were highly esteemed while lower-level unskilled workers completed simple routine tasks.
All laborers were paid.

He did not pass the necessary exams to qualify for guild membership

He had signed a contract forgoing payment in exchange for on-the-job training.

He was not born into a family of skilled laborers

His specialty did not fall under masonry or glazing.
Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
6 0

Answer:

He was not born into a family of skilled laborers

Explanation:

You might be interested in
IN PYTHON LANGUAGE
shtirl [24]

favorite_color = input("Enter favorite color:\n")

pet = input("Enter pet's name:\n")

num = input("Enter a number:\n")

print("You entered: "+favorite_color+" "+pet+" "+num)

password1 = favorite_color+"_"+pet

password2 = num+favorite_color+num

print("First password: "+password1)

print("Second password: "+password2)

print("Number of characters in "+password1+": "+str(len(password1)))

print("Number of characters in "+password2+": "+str(len(password2)))

This works for me.

8 0
2 years ago
Read 2 more answers
Consider the following two code segments: Segment 1: while (k > 0) { System.out.println(k); k--; } --------------- Segment 2:
zepelin [54]

Answer:

Always same value

Explanation:

These both code segments will always generate identical values given that we provide same value of k to both segments.

You can see attached pictures.

6 0
3 years ago
Write a c++ program that accepts a string from the user and then replaces all occurrences of the letter e with the letter x
mixer [17]

Answer:

#include <iostream>

using namespace std;

int main()

{

   string str;

   cout<<"Enter the string: ";

   cin>>str;

   for(int i=0;str[i]!='\0';i++){

       if(str[i]=='e'){

           str[i]='x';

       }

   }

   cout<<"the string is: "<<str<<endl;

  return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

Create the main function and declare the variables.

Then, use the cout instruction and print the message on the screen.

cin store the string enter by the user into a variable.

After that, take a for loop and if-else statement for checking the condition if the string contains the 'e', then change that alphabet to 'x'.

This process continues until the string not empty.

Finally, print the updated string.

6 0
3 years ago
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
galben [10]

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

5 0
2 years ago
Which domain of an IT infrastructure primarily includes the processes and procedures that end users use to remotely access an or
Natalka [10]

Answer:

The answer is "Remote Domain Access".

Explanation:

It is also known as web access, it is an opportunity to moderately access a desktop or network over a connection to the internet. It also allows you to download the structures, that want even if they are not mentally and emotionally able to communicate specifically.

  • In other words, it uses a satellite for interaction or internet service, and users can access systems remotely.
  • It is also used in the database, that's why it is the correct answer.
6 0
3 years ago
Other questions:
  • a. Show the output of the following program: 1: public class Test { 2: public static void main ( String [] args ) { 3: A a = new
    14·1 answer
  • 2. Add a _______ to manually force text from one page to the next page. A. footer B. page break C. blank page D. header
    11·2 answers
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
    9·2 answers
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random int
    14·1 answer
  • Why do you usually find domain names instead of IP addresses in a URL? Select one: a. An IP address would make your web page loa
    11·1 answer
  • The following pieces are known as (image shown above)
    15·2 answers
  • Merging refers to dividing a single cell into multiple cells. *TrueFalse
    14·1 answer
  • To what extent do preexisting personal biases affect representation in new media
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!