1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
13

When penetrating a concrete fire-resistive wall or floor assembly with rmc, it is not acceptable to use mortar to fill the annul

ar space?
Computers and Technology
1 answer:
V125BC [204]3 years ago
4 0
This statement is not true

There are two main categories of fire-resistance-rated assembly penetration: Membrane penetration and through-penetrations. Items through penetration pass completely through the fire-resistance-rated assembly. As compared to many other codes provisions, requirements for through-penetrations have their exceptions.
For example, IBC allows penetrating pipes of steel in fire-resistance-rated walls to have the annular space which is the gap that exist between the penetrating item and the floor or the surrounding wall filled with concrete, mortar in masonry or grout.

You might be interested in
Can someone help me to give this guy brainliest the button is not there
slamgirl [31]

Answer:

hmm maybe try to reload the page

Explanation:

8 0
3 years ago
Which statement is false? Select one: a. Function printf does not care how large the array it is printing is. b. Function scanf
dusya [7]

Answer:

Option A

Explanation:

Because each function has specific amount of space allocated by default on the stack, so it cares about the length of the array being printed by it. By default the space is up to 100 kb but this size can be increased by setting it manually.

Option B is correct answer because scanf takes input from user until first space is hit.

6 0
4 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Which should be addressed by stakeholders when reviewing the problem statement? Select all that apply. All possible outcomes hav
kumpel [21]

Answer:

  • The problem as they see it has been addressed
  • The solution proposed will meet their needs
  • The needs of their colleagues are being met
  • All issues and constraints have been identified

Explanation:

The stakeholders in a project or business involves every human resource of the business/project that is essential to the successful completion of the business/project at hand.

The factors to be addressed by stakeholders when reviewing a problem statement is very important for the success of the project hence : the problem as seen in the problem statement has to be addressed, the solution been proposed to solve every problem identified should meet the needs of every stakeholder, also every stakeholder in a project has to be carried along hence the need of every stakeholder has to be considered as well.

7 0
3 years ago
Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
Galina-37 [17]
Is advertising influencing her?
What are her motivations?
Has she compared prices?
Is she buying at the right time?
5 0
3 years ago
Read 2 more answers
Other questions:
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    11·1 answer
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • Which of the following is not one of DBA's tasks?
    14·1 answer
  • Antivirus software uses ________ to search for known viruses.
    9·1 answer
  • What are the properties of magnetic field​
    8·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Why is it important to protect people's intellectual property online?
    10·1 answer
  • The process of adding a header to the data inherited from the layer above is called what option below
    8·1 answer
  • Identify the angle.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!