1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
3 years ago
10

inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. true or false?​

Computers and Technology
1 answer:
Volgvan3 years ago
8 0

Answer:

True.

Explanation:

A maintenance department refers to a section of an organization that comprises of employees who are saddled with the responsibility of providing timely and professional assistance in repair and servicing of equipments or machineries used by the core departments such as the production department.

This ultimately implies that, the maintenance department provides assistance such as repairs, error-preventive services, etc.

As a rule, end users or technicians should inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. This would help to preserve the tools and equipment and by extension, increasing their life span.

You might be interested in
Computers have drastically changed society over the last 20 years. How have computers affected communication in the business wor
iren2701 [21]

<u>Drastic change of over society Computers:</u>

In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.

Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.

1. Crime (computer)

2. failure of responsibility in the computer.

3. Protection of software records and documents etc.

4. End user  data protection and privacy.

99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.

5 0
3 years ago
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with
poizon [28]

Answer:

An answer to this question is given below in explanation section.

Explanation:

The given question is incomplete. First, we write the complete question that is:

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Run telnet in a terminal and capture the traffic on Wireshark. For example, open a telnet session using this command: "telnet cs537.cs.csusm.edu". What are the source and destination port numbers for the following items?

  1. the segment sent from A to S.
  2. the segment sent from B to S.
  3. the segment sent from S to A.
  4. the segment sent from S to B.
  5. if A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S?
  6. how about if they are the same host?

Answers

                           Source Port Numbers               Destination Port Number

  1. A -> S                      1467                                               23
  2. B -> S                       1513                                               23
  3. S->A                         23                                                  1467
  4. S->B                         23                                                  1513
  5. Yes, it is that the source port number in the segement from A to S is the same as that from B to S. In short, there is no relationship between port numbers on different hosts
  6. no, a port number identify UNIVOCALLY a process.

5 0
3 years ago
____ is an integrated system that collects and processes data and manages and coordinates resources, information, and functions
miss Akunina [59]

Answer:

a.) Enterprise Resource Planning  

Explanation:

5 0
3 years ago
AppWhich is the same class of lever as a broom?
Pavel [41]

Answer:

A. boat oar is your answer hope it helped

6 0
4 years ago
Which of the following criterion expressions searches for PhoneNumber records where the phone number contains 10 characters and
Kay [80]

Answer:

A) Like "9?????????"

Explanation:

Required

10 characters and starts with 9

<em>The options relate to queries in Microsoft Access; so, I will answer the question from the perspective of Microsoft Access.</em>

First, the query will use the like statement because the query is to make comparison.

Next; for the search query to return exact 10 characters, the syntax is "??????????"

Lastly, for the search query to begin with 9, the first ? will be replaced with 9.

So, we have: "9?????????"

<em>Hence, (a) is correct</em>

6 0
3 years ago
Other questions:
  • A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
    9·1 answer
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    9·1 answer
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 18
    11·1 answer
  • What term is used to describe a shared database of domain users, groups, computers, resources, and other information, along with
    14·1 answer
  • Leah and Santana have been requested to print a daily report of scheduled activities. Their supervisor needs to know if each par
    11·1 answer
  • To show the navigation pane if it is hidden, click the ____ button
    12·2 answers
  • Cotización de un software
    12·1 answer
  • How can you quickly locate emails with large attachments.
    14·1 answer
  • Connect research concepts to their definitions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!