1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
9

Directions: Identify the measuring devices and write its functions.

Computers and Technology
1 answer:
FrozenT [24]3 years ago
5 0

Answer:

1.weigher - to weigh meat

2.

3. scissor - to cut things

4. tongs

5.measuring cups - to measure dry ingredients like flour

6 temperature - measures temperature

7 measuring spoons

You might be interested in
Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer syst
Lyrx [107]

Answer: PDF

Explanation:

6 0
3 years ago
Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
daser333 [38]

Solution :

Here, we need to perform JOIN operation of the students and registration.

Use NATURAL JOIN operator \Join and so no need to specify Join condition.

Also we need to selection operator tp select only those course whose major in "philosophy".

Finally we projection operator π to project only distinct students name who took at least three courses.

$\pi [\sigma_{\text{student's nam}e} [ \sigma(\text{three courses}) \Join \text{"Philosophy"}]]$

7 0
3 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
sp2606 [1]

Change default user name and password is the first step that should be performed by Derek to secure the wireless router

<h3><u>Explanation:</u></h3>

The device that helps in accessing internet or to any private computer network is the wireless router. It is a devices that acts as the access point which is wireless in nature. There are many steps involved in securing  the wireless router. If the wireless router is not secured then it will be used by others without our knowledge.

In order to secure the wireless router firstly we should create our won password and username deleting the default username and password.To do this, we must open router setting page and change the default username and password with our own. The SSID name of the network must also be changed.

6 0
4 years ago
Question 3 (8 marks): Write a program that takes a string from the user and splits it into a list using a space (" ") as the del
bonufazy [111]

Answer:

In Python:

mystr = input("Sentence: ")

mylist = []

word = ""

for i in range(len(mystr)):

   if not i == len(mystr)-1:

       if not mystr[i] == " ":

           word+=mystr[i]

       else:

           mylist.append(word)

           word = ""

   else:

       word+=mystr[i]

       mylist.append(word)

print(mylist)

Explanation:

Prompt the user for an input sentence

mystr = input("Sentence: ")

Initialize an empty list

mylist = []

Initialize each word to an empty string

word = ""

Iterates through the input sentence

for i in range(len(mystr)):

If index is not the last, the following if condition is executed

   if not i == len(mystr)-1:

If the current character is not space

       if not mystr[i] == " ":

Append the character to word

           word+=mystr[i]

If otherwise

       else:

Append word to the list

           mylist.append(word)

Set word to an empty string

           word = ""

If otherwise; i.e. If index is not the last

   else:

Append the last character to word

       word+=mystr[i]

Append word to the list

       mylist.append(word)

Print the list

print(mylist)

5 0
3 years ago
What must be done before using ArrayLists?<br><br> (This is Java Programming btw)
Viktor [21]

Answer:

to create an ArrayList , you declare an Arraylist variable and call the ArrayList constructor to instantiate and ArrayList object and assign it to the variable

5 0
3 years ago
Other questions:
  • What is malware short for?
    13·2 answers
  • Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notice
    8·1 answer
  • Create a lottery game application. Generate three random numbers (see Appendix D for help in doing so), each between 0 and 9. Al
    14·1 answer
  • Cómo pongo un tomo de llamada SIN PAGAR?
    7·1 answer
  • Why would it be a bad idea for gateways to pass broadcast packets between networks? What would be the advantages of doing so
    12·1 answer
  • Most of us have been using elements of Web 2.0 without even realizing it.<br> True<br> False
    6·1 answer
  • 1.Can ICTs be innovatively used in the absence of minimum literacy levels among the poor?
    5·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • Given a MxN matrix.Print the elements in odd rows from left to right and the elements in even rows from right to left.(Java or C
    11·1 answer
  • How is hybrid computer used in hospitals? please reply fast!!​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!