1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
7

Cuántos tipos de grua existen en el mundo​

Computers and Technology
1 answer:
natka813 [3]3 years ago
3 0
Grúas semi pórtico, carretilla pórtico, side lifter, grúas torre, grúas puente, grúas flotantes... y mas
Espero q esto te ayude! :))
You might be interested in
Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction stor
NISA [10]

Answer:

java

Explanation:

Java es rápido, seguro y fiable. Desde ordenadores portátiles hasta centros de datos, desde consolas para juegos hasta computadoras avanzadas, desde teléfonos móviles hasta Internet, Java está en todas partes. Si es ejecutado en una plataforma no tiene que ser recompilado para correr en otra. Java es, a partir de 2012, uno de los lenguajes de programación más populares en uso, particularmente para aplicaciones de cliente-servidor de web

6 0
2 years ago
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more tha
fenix001 [56]

Answer:

A. LCD power inverter

B. AC adapter

C. Battery

4 0
3 years ago
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
3 years ago
What is also known as a visual aid in a presentation
kari74 [83]

the answer is slide

I took notes off of plato and it quoted word for word

A slide is a visual aid, also known as a single screen of presentation

:) hope this helps

5 0
3 years ago
Read 2 more answers
Help please not trying to fail
deff fn [24]

Answer:

B. Everywhere CFCI is not

8 0
3 years ago
Other questions:
  • What is computer? Explain the characteristics of computer.<br>​
    12·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • A software package developed to handle information requirements for a specific type of business is called a(n) ____. A. outsourc
    10·1 answer
  • What does advance mean​
    6·1 answer
  • How ict tools changed the way we live explain it​
    12·1 answer
  • Which of the following is not a reason to choose a community college?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!