1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
12

Directions: Arrange the jumbled letters to make/form a new word. Then give a

Computers and Technology
1 answer:
kramer3 years ago
4 0

Answer:

1. Heincma Ilo- Machine Oil  

2. Cholt Madp- Damp Cloth  

3. Niemhac Winseg- Sewing Machine

4. Sonapler- Personal Protective Equipment Veticetport Quiptempen  

5. Eeendl Isez- Needle Size  

6. Malls Nib- Small Bin  

7. Binnob Drewin- Bobbin Winder  

8. Nilt Bursh- Lint Brush  

9. Bonbib Koho- Bobbin Hook  

10. Delene Llapte - Needle Plate  

 

Explanation:

  1. Machine Oil: This is used to lubricate the sewing machine gear, prevents/ reduces wear, tear, and rust of the parts which are made of metal;
  2. Damp Cloth: This is used to remove tough stains on the machine without leaving too much moisture on it. When water or moisture reacts with the iron and oxygen, it forms rust which is not good for the machine.
  3. Sewing Machine: This is used to putting or sewing fabric together
  4. Personal Protective Equipment: These are equipment that a tailor or sewing factor worker must put on when at work to prevent or minimize the risk of injuries. They include but are not limited to:
  • Facemasks
  • Hand gloves
  • Eye Protection

5. Needle Size: Various sizes of needles are needed to sew different kinds of fabric;

6. Small Bin: This is mostly for ensuring good home keeping. Good home-keeping means managing the waste in the factory area. By collecting them in a bin, they are easy to dispose of.

7. Bobbin Winder: This is used to wind the thread around a bobbin evenly.

8. Lint Brush: This is used to remove lint. Lint is simply a collection of accumulated fibers from textile and non-textile materials.

9. Bobbin Hook: This term is used to describe the part which extends outwards like a finger that encircles the bobbin case.

10. Needle Plate: This is present in all sewing machines. It is installed to guide one as they sew and also covers the bobbin compartment.

Cheers!

You might be interested in
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
Identify the following keys. write AK for Alphanumeric keypad,NK for Numeric Keypad,CK for Cursor Key, FK for Function keys and
natali 33 [55]

Answer:need points for stuff

Explanation:

4 0
2 years ago
What are the 2 types of Digital Imagery?
Darina [25.2K]

Answer:

vector or raster

Explanation:

7 0
3 years ago
How to get the pc accelerate pro virus off my computer
garik1379 [7]
Try to see a computer specialist to help
4 0
3 years ago
Read 2 more answers
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
AURORKA [14]

Answer:

<em>B. Pirated software </em>

Explanation:

Software piracy is used <em>to define the act of using, duplicating or  transferring software unlawfully without property or legal rights.  </em>

Today, most software is bought as a single-user permit,  <em><u>which means that at one moment only one PC could have that software running on it. </u></em>

Trying to copy the software to various devices or distributing it without  multiple licenses is regarded to be illegal software piracy.

4 0
4 years ago
Other questions:
  • In the LC-3, how many memory words are used to store the string "rainbow"?
    11·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Which one of the following pieces of information would be allowed as part of a limited data set?
    15·1 answer
  • The browser on which you are viewing web pages is called the
    13·1 answer
  • What is application software used for
    13·1 answer
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • How do you customize calendar view​
    9·2 answers
  • Name:
    13·1 answer
  • What is the name of the first practical asymmetric cryptosystem that was created?
    15·1 answer
  • Determine whether the compound condition is True or False.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!