1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
2 years ago
6

Cual es el procedimientos para asistir en el transporte publico a personas discapacitadas

Computers and Technology
1 answer:
artcher [175]2 years ago
7 0

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

You might be interested in
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Examine the following output:
zepelin [54]

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

8 0
3 years ago
Can file extension txt be used in other os
rodikova [14]
Yes, a text file with a .txt extension can be read by Linux/Unix/Mac as they are ASCII unformatted.
6 0
3 years ago
What is the output of the following query? SELECT INSERT ('Knowledgeable', 5, 6, 'SUPER');
Scrat [10]

Answer:

The above query gives an error.

Explanation:

  • The query gives an error because is not the correct syntax of the select or inserts query.
  • The syntax of the select query is as follows: "select Attributes_1_name, Attributes_2_name,...., Attributes_n_name from table_name;".
  • The syntax of the insert query is : "insert into table_name (column_1_name, column_2_name,...,column_n_name) values (column_1_value, column_2_value,...,column_n_value);".
  • The syntax of the insert and select query is : "insert into table_name (select Attributes_1_name, Attributes_2_name,...., Attributes_n_name from table_name);".
  • But the above query does not satisfy any property which is defined above. Hence it gives a compile-time error.
6 0
3 years ago
Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
ryzh [129]

Answer:

c. decDiscount = GetDiscount(decSales, decRate)                                                                                                                          

Explanation:

Option a. is incorrect because it is using Call word which is not a valid way to invoke a function.

Similarly option b. is also incorrect because it uses Call word to invoke function GetDiscount() which is not a valid way to call a function and also it is passing it the contents of three variables decSales, decRate and decDiscount and as mentioned in the question only two parameters are to be passed to GetDiscount() function.

Option c. is correct as it invokes the function GetDiscount() and passes it the contents of two variables decSales and decRate and assigns this to a variable decDiscount. For example if the GetDiscount() method has to calculate the discount using decSales and decRate then the resultant value of this computation is assigned to decDiscount. So whatever this function returns or computers is assigned to and stored in decDiscount variable. So this is a valid way to invoke a method.

3 0
2 years ago
Other questions:
  • You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following
    5·1 answer
  • How can i save a word 2016 document as a word 2016 document?
    6·1 answer
  • You have found statistics on the Internet that you would like to use in your speech.
    6·1 answer
  • Which of these jobs would be most appropriate for someone who majors in information technology? managing a database for a large
    6·2 answers
  • Select the recommended design practice that applies to a web site using images for main site navigation.
    7·1 answer
  • Which is an example of an incremental approach to solving a problem?
    15·1 answer
  • The fall of the Berlin Wall and the emergence of a way to find things on the Web through the Netscape browser were two that was
    10·1 answer
  • In which table is the input and the corresponding output of a Boolean function listed? How is the output of the NAND gate determ
    9·1 answer
  • How to turn off windows 10 without loosing sound?
    11·1 answer
  • Briefly explain specialisation?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!