1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
6

Select the correct text in the passage. Idenufy the phrase that shows the use of a non-contact-type temperature sensor. Jim work

s in an iron and steel industry. He is allowed to enter only on successful biometric verification by sensors at the gate. Working in close proximity to molten metals is risky. To enable accurate and safe measurement, sensors determine the melting point of the metals and display them to Jim. In the evening, Jim goes to a friend's place in his new GPS-powered car. He listens to music on the radio while driving.​
Computers and Technology
1 answer:
suter [353]3 years ago
5 0

Answer:

where he is allowed only to enter on successful biometric verification by sensor at the gate,,it shows to some extent there is no contact,,,the molten we are told is risky so there should be no close contact with it,,

You might be interested in
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
Advocard [28]

Answer:

A. True.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.

Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.

7 0
3 years ago
Weekly salary and assumes work-hours-per-week limit of 40. Overtime refers to hours worked per week in excess of some weekly lim
hodyreva [135]

Answer:

import java.util.Scanner;

public class WeeklySalary {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Hourly wage");

       double hourlyWage = in.nextDouble();

       System.out.println("Enter total hours worked in the week");

       int hoursWorked = in.nextInt();

       int overtime = hoursWorked - 40;

       double weeklyWage = 40*hourlyWage;

       System.out.println("Total Over Time Hours is: "+overtime);

       double overTimeWage = overtime*(hourlyWage*1.5);

       System.out.println("Wage for full time: "+ weeklyWage);

       System.out.println("Wage for over time: "+ overTimeWage);

   }

}

Explanation:

  • Using Java programming language
  • Import the Scanner class to receive user input
  • prompt user for hourly wage rate, receive and save in a variable
  • Prompt user for total hours worked for the week receive and save in a variable
  • calculate overtime hours by subtracting 4 from total hours worked in the week
  • Calculate weekly wage by multiplying hourly rate by 40
  • Calculate overtime by multiplying overtime hours by (hourlyWage*1.5).
  • See attached sample run of the code

8 0
3 years ago
The diagram shows the positions of the Sun, Earth, and Moon during each moon phase. When viewed from Earth, at what point does t
goldfiish [28.3K]

Answer:

B

Explanation:

when it is on the same side of Earth as the Sun because it appears all black because of the shadow

7 0
2 years ago
About how many jobs in the United States require Microsoft expertise?
GarryVolchara [31]
Answer: C because bill gates is the owner
5 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Other questions:
  • You must establish credit in order to buy a house true or false
    5·2 answers
  • B. Write a function that takes one double parameter, and returns a char. The parameter represents a grade, and the char represen
    7·1 answer
  • Which person would be the best fit for a career in the information technology field?
    14·1 answer
  • Where do you go to create a workbook?​
    8·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • Who wants to talk? I am willing to talk to anyone! I AM SO BORED!!
    13·2 answers
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Successful Web sites such as StumbleUpon ( www.stumbleupon) and Digg ( www.digg) use ____ by inviting their visitors to vote on
    8·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!