1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
8

Tech A states that modern vehicles use asbestos as the brake material. Tech B states that asbestos is no longer used in brakes.

Who is correct?
Computers and Technology
1 answer:
Tanya [424]3 years ago
4 0

Answer:

Tech A is correct.

Explanation:

The modern day vehicles have brakes system equipped with asbestos. It is a mineral which is a kind of fibrous crystal which enables the friction to stop the vehicle. The technician A specifies that the modern day automobiles use asbestos for their brake system.

You might be interested in
A self-confident person knows that:
Ganezh [65]
It’s c for sure because it the only one making more since
3 0
3 years ago
________ uses the signals transmitted over the phone to access the database, retrieve account information and input data. Group
Jobisdone [24]

Answer:

Interactive voice response

Explanation:

Interactive voice response (IVR) is a technological innovation which allows computer systems to interact with individuals with the use of voice and Dual-tone multi-frequency signaling (DTMF) tones input through a keypad. In telecommunications sector, IVR enables customers to interact with a company’s host system through the use of a telephone keypad or by using speech recognition, after which services can be accessed by the use of the IVR dialogue.

3 0
3 years ago
Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
yanalaym [24]

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

3 0
4 years ago
Read 2 more answers
Choose the correct term to complete the sentence.
Andre45 [30]

Answer:

Technology

Explanation:

Edge 2021

8 0
3 years ago
A student who used a regression model that included indicator variables was upset when receiving only the following output on th
jeka57 [31]

Answer:

This is a multicolinearity problem and the student should determine the variable(s) that cause(s) the problem and remove it.

Explanation:

This information means that there exists a linear combination between the independent variables. The problem might have developed due to multicolinearity producing almost perfectly linearly dependent columns.

This could also be as a results of single matrix created when the student use an incorrect indicator variables and included an additional indicator column which created linearly dependent columns.

4 0
3 years ago
Other questions:
  • Yet another variation: A better packet switched network employs the concept of acknowledgment. When the end user’s device receiv
    11·1 answer
  • A is a paid placement that appears in a search engines results page at or near the top of the results
    5·1 answer
  • The CSS property of top , bottom , left , or right moves the element the specified distance from the respective edge of the clos
    7·1 answer
  • If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?
    11·2 answers
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • PLEASE HELP I WILL GIVE BRAINLIEST!!!!
    7·2 answers
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    10·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
  • QUESTION 4
    13·1 answer
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!