1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
9

You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following

actions should you take? A. Operate this switch only after normal working hours. B. Operate this switch only after getting permission from the person who signed the tag. C. Operate this switch only after making certain no one is working on the affected circuit. D. Operate this switch only if more than 24 hours have elapsed since the tag was signed.
Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
6 0
The answer should be B
Lorico [155]3 years ago
5 0

Answer:

B

Explanation:

Only once the tag is removed, can switch be operated and tag can only be removed after taking approval form the person who authorized or signed the tag. This approval is necessary because the person who authorized the tag would know the exact reason why the tag is placed.

You might be interested in
What is the quick key to highlighting a column?
BaLLatris [955]

Answer:

B is the answer.. pls mark me as brainliest

ctrl+shift+down arrow

Explanation:

7 0
3 years ago
Routing and remote access services allow users to connect to private networks using or:.
Luda [366]

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.

8 0
2 years ago
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
Vesnalui [34]

Answer:

d. 65536

Explanation:

When the network administrator received the IPV6 prefix for subnetting and we have assumed that the administrator does not subnet into their interface ID portion.So the number of subnets the administrator can create from the /48 prefix are 65536.

Hence the answer to this question is 65536.

3 0
3 years ago
A programmer wants to write a procedure that calculates the net elevation - total number of feet a traveler goes up and down. Fo
ch4aika [34]

Answer:

Pseudocode

////////////////////////////////////////////////////////////////////////////////////////////////////////////

Integer netElevation(list of elements of type elevation - type and number)

<em>function open</em>

   Define running total = 0

   for each element from list

   <em>loop open</em>

       elevation type = element[i].type

      if (elevation type == Up)

           running total = running total + element[i].number

       else

           running total = running total - element[i].number

   <em>loop close</em>

   return running total

<em>function close</em>

3 0
3 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Westkost [7]

Answer:

The ping command.

Explanation:

In a network, workstations known as clients, users or nodes are the devices where data is needed or sents from. A server on the other hand, is a device in the network, configured to render a particular service like database, domain name service, web service etc.

When a link from a workstation to a server is down, the workstation looses connection the server. To confirm the connectivity of the link, "ping" the server ip address from the workstation using the command "ping 'server ip address'". This sends echo packets to the server, which is echoed back if there is connectivity.

6 0
3 years ago
Other questions:
  • I need help RIGHT NOW PLZ!!!!!!!!!!!!! this is due in 5 mins
    13·1 answer
  • kindly for the website of stedeo code.org if I login is the time of logging appears at my teacher ??is it registered ​
    14·1 answer
  • Splunk In most production environments, _______ will be used as the source of data input?
    12·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
    6·1 answer
  • You have four 2.5ʺ hard drives on hand and need a replacement drive for a desktop system. The documentation for the motherboard
    9·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • Do warnings ever expire?
    9·2 answers
  • A computer has __________processing device
    13·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!