1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
9

You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following

actions should you take? A. Operate this switch only after normal working hours. B. Operate this switch only after getting permission from the person who signed the tag. C. Operate this switch only after making certain no one is working on the affected circuit. D. Operate this switch only if more than 24 hours have elapsed since the tag was signed.
Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
6 0
The answer should be B
Lorico [155]3 years ago
5 0

Answer:

B

Explanation:

Only once the tag is removed, can switch be operated and tag can only be removed after taking approval form the person who authorized or signed the tag. This approval is necessary because the person who authorized the tag would know the exact reason why the tag is placed.

You might be interested in
Write a C function namedliquid()that is to accept an integer number and theaddresses of the variablesgallons,quarts,pints, andcu
salantis [7]

Answer:

#include <stdio.h>

#include <math.h>

void liquid(int ,int*,int*,int*,int*);

int main()

{

int num1, gallons, quarts, pints, cups;  

printf("Enter the number of cups:");

scanf("%2d",&num1);  

liquid(num1, &gallons, &quarts, &pints, &cups);  

return 0;

}  

void liquid(int x, int *gallons, int *quarts, int *pints, int *cups)

{

static int y;

y = x;  

if (y >= 16)

{

*gallons = (y / 16);

printf("The number of gallons is %3d\n", *gallons);

}

if (y - (*gallons * 16) >= 4)

{

*quarts = ((y - (*gallons * 16)) / 4);

printf("The number of quarts is %3d\n", *quarts);

}

if ((y - (*gallons * 16) - (*quarts * 4)) >= 2)

{

*pints = ((y - (*gallons * 16) - (*quarts * 4)) / 2);

printf("The number of pints is %3d\n", *pints);

}

if ((y - (*gallons * 16) - (*quarts * 4) - (*pints *2)) < 2 || y == 0)

{

*cups = (y - (*gallons * 16) - (*quarts * 4) - (*pints *2));

printf("The number of cups is %3d\n", *cups);

}

return;

}

5 0
3 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
vova2212 [387]

Answer: Client-Server model

Explanation:

The Client-server model is a distributed network application configuration, that partitions task or where one program requests a resource or service from another program, between the providers of a resource or service, called servers, and service requesters called clients. In the client-server architecture, when the client computer sends a request for data to the server through the internet, the server accepts the requested process and deliver the data packets requested back to the client.

4 0
3 years ago
Classified Computer by their age​
andreyandreev [35.5K]

Answer:

The answer is below

Explanation:

Classification of computers by age are the following:

First generation from 1940 to 1956. For example, ENIAC using a vacuum tube

Second generation from 1956 to 1963. For example, IBM 7070 using transistor

Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit

Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.

Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.

5 0
3 years ago
Why is binary code made up of a series of ones and zeros?
Nadusha1986 [10]

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often the binary number system's 0 and 1. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

8 0
3 years ago
Other questions:
  • Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market
    5·1 answer
  • You will use the _____
    15·2 answers
  • Which of the following is NOT true about placement of the keyboard?
    6·1 answer
  • Résumés for teenagers and young adults typically consist of<br> (Apex)
    11·2 answers
  • Select all that apply. To assist in document sharing, you should?
    12·2 answers
  • What is the action take to the input called?
    15·1 answer
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
    13·1 answer
  • Which one of the following document types would you not use the Microsoft Excel program to create?
    9·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!