1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
11

2. 5s is a Chinese principle adapted for use in the workplace.True or False​

Computers and Technology
1 answer:
garik1379 [7]3 years ago
3 0

Answer:

A. true

Explanation:

because 5s is the.................

You might be interested in
What is the name of the computer through which e-mail messages are sent and received?
nalin [4]
A mail server. --------------------------------------------
8 0
3 years ago
Assume the existence of a Building class with a constructor that accepts two parameters:_________ a reference to an Address obje
Maksim231197 [3]

Answer:

class Building { int toatalUnit; Building(Building add, int x) { } } public class ApartmentBuilding extends Building { int toatalUnit; ApartmentBuilding(ApartmentBuilding add, int a, int b) { super(add, b); this.toatalUnit = b; } }

Explanation:

Assume the existence of a Building class with a constructor that accepts two parameters:_________ a reference to an Address object representing the building's address, and an integer for the square footage of the building. Assume a subclass ApartmentBuilding has been defined with a single integer instance variable, totalUnits. Write a constructor for ApartmentBuilding that accepts three parameters: an Address and an integer to be passed up to the Building constructor, and an integer used to initialize the totalUnits instance variable.

class Building { int toatalUnit; Building(Building add, int x) { } } public class ApartmentBuilding extends Building { int toatalUnit; ApartmentBuilding(ApartmentBuilding add, int a, int b) { super(add, b); this.toatalUnit = b; } }

5 0
3 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
4 years ago
Which carrier sense technology is used on wireless networks to reduce collisions?
skad [1K]
CSMA/CA is used on wireless networks to reduce collisions.
8 0
3 years ago
Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
Vera_Pavlovna [14]

Answer:

Hippocampus.

Explanation:

There are two parts of the limbic system. They are the frontal part which is the amygdala and the posterior part which is the hippocampus.

The hippocampus is an extension of the temporal part  of the cerebral cortex which is a plastic-like structure that can be easily damaged by stimuli. It is packed with densed neurons and forms an S-shape at the extension of the temporal part.

It is responsible for learning and memory and damage to it can result to memory loss of recently learnt information.

8 0
3 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
    13·2 answers
  • Each processor or core processes two threads at the same time is called _________.
    5·1 answer
  • The outstanding disk requests are for tracks 6,10,4,20,36,8, and 40 in that order. Assume that the seek time speed is 5 msec/tra
    14·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    10·1 answer
  • What was the first e-commerce service?
    10·1 answer
  • Open IDLE. Create a new script file (File-->New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name
    6·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • What type of data would a RDBMS store in a linked list, two-way linked list, or B-trees? What are the advantages and disadvantag
    5·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!