1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
13

What type of engineer would be most likely to develop a design for cars? chemical civil materials mechanical

Engineering
1 answer:
Andreyy893 years ago
4 0
I don’t know but good luck
You might be interested in
Which of the following is not caused by alcohol?
Brrunno [24]

Answer:

Inhibited comprehension

4 0
3 years ago
Read 2 more answers
How much paint would you need to cover one bedroom wall using 2 coats of paint?
Thepotemich [5.8K]

Answer:

One gallon of paint can cover about 400 square feet of wall.

18 x 15 feet is 270 feet of space.

270/400 = .675 gallons for one coat on one wall

.675 x 4 = 2.7 gallons for one coat on all walls

2.7 gallons x 2 = 5.4 gallons of paint in all

5 0
3 years ago
Although not explicitly discussed in the chapter, packet size would seem to have an impact on transmission time. Discuss whether
netineya [11]

Answer and Explanation:

It is True that packet size increases the transmission time of the packets. This is because packet transmission would be impacted depending on the packet size, whether it is large or small. Here comes the concept of bandwidth of the medium. For a particular bandwidth of the medium, if the packet is small then many such packets can pass through the medium at a given time, rather than less packets at a given time when the packet sizes are larger. Transmission time of a packet = Packet size / Bandwidth of the medium.

If the bandwidth is high, the transmission time will be less. Also, if the packet size increases then, as we saw above the transmission time will increase.

Every packet has to have a header information in which there will be several information and data about the packet and the protocol it follows, also what is the source and destination of the packet. The information contained in the header of a packet may vary in case of different protocols. The address portion of the packet is a overhead but us actually necessary when the packet needs to be transferred from a source to a destination using a protocol. The size of the header varies from protocol to protocol and is an overhead and has impact on data transmission rates since size of the packet increases because of the header.

7 0
4 years ago
At a construction site, there are constant arguments and conflicts amongst workers of different contractors and sub-contractors.
jeyben [28]

Interpersonal skill is required by the construction manager to resolve the arguments and conflicts among workers and between the contractors.

Answer: Option(d)

<u>Explanation:</u>

  • Interpersonal skills are a set of behavioral action that involves the person to interact freely with other peoples effectively.
  • A person before interacting with others should pay attention, listen to their words and give responses to them after they finish with their arguments.
  • In the above answer, the construction manager has to develop interpersonal skills to resolve the issues, conflicts, and arguments raised by his employees.
  • The manager must listen to their needs and demands possessed and should take necessary action in resolving the issues.
  • For that, the manager has to interact freely and effectively with their employees in resolving the issues.
6 0
4 years ago
You have just been hired as the Security Manager of a medium- sized Financial Services company employing 250 people in New Hamps
lakkis [162]

Answer:

Explanation:

Let us Begin with the first Policy;

Email Policy

  • Outline/Overview - At present, email is truly outstanding, simple, and well known correspondence medium which interfaces workers, clients, and different partners of the organization. Because of the improvement of the innovation, the aggressors are attempting to utilize email for doing assaults which are driving security dangers inside the organization. Henceforth, it is significant for all representatives to comprehend the best possible utilization of email.

  • Reason/Purpose - The motivation behind the email strategy is to affirm the correct utilization of email address of the organization by the representatives.

  • Scope - The arrangement is covering the utilization of any email which is sent from an organization email address. It additionally applies to all related representatives, clients, and different partners who are working in the interest of the organization.

  • Policy

  1. The email address of the organization ought to be utilized by workers just for business reason. Representatives are restricted to unlawfully utilize the organization email address.
  2. The utilization of the email office must be steady with other security approaches of the organization. It gives the guarantee of the moral conduct inside the organization.
  3. The "Information Protection Standards" must be utilized to make sure about the substance of the messages.
  4. The organization must need to hold just clear email and keep up a record which stores the substance of the necessary messages.
  5. The representatives ought to need to take care during opening any sort of dubious email which originates from unlawful location. They should need to answer to the security chief on the off chance that they got any sort of such email.
  6. It isn't permitted to advance email to any outsider utilizing the organization email address.
  7. The representatives are not permitted to utilize the organization email address for individual works and correspondence.

  • Policy Compliance - The security group of the organization will confirm the consistence of the approach utilizing suitable strategies, for example, stroll through, inward and outside reviews, business instrument reports, video checking, and input. The security group must need to educate and support any sort of special case to the arrangement ahead of time.

  • Related Standards, Policies, and Processes - Data assurance guidelines
  • Definitions and Terms - None

The Second Policy;

WIFI and Internet usage policy

  • Overview -  The expanding utilization of web associations is bringing different sorts of security dangers for the organization. It turns into a significant asset of assault. A WIFI and Internet utilization strategy will control the unlawful and dishonest use of web assets inside the organization.

  • Purpose - The motivation behind WIFI and Internet use strategy is to affirm the best possible utilization of WIFI and Internet by the representatives inside the organization.

  • Scope - The arrangement applies to each web client including full-time representatives, low maintenance workers, colleagues, and so on of the organization.

  • Policy

  1. Asset utilization – Employees will get consent and endorsement to get to WIFI and Internet if sensible business needs are found. As per the present place of employment obligations, the WIFI and Internet administrations will be conceded to the workers.
  2. Permitted utilization – WIFI and Internet use is conceded to representatives just for supporting the business capacities and finishing some other important works. All web clients must need to follow the business standard during the utilization of assets.
  3. Individual use – Employees can by and by utilize the WIFI and Internet assets by taking consent from the IT office. They should need to take care during individual use as the organization consistently screens their web use exercises.
  4. Denied utilization – The representatives are not permitted to abuse the accessible database of the organization or unlawful web surfing through organization web assets.

  • Policy Compliance - The security group of the organization will confirm the consistence of the arrangement utilizing proper techniques, for example, stroll through, interior and outer reviews, business apparatus reports, video checking, and input.

  • Related Standards, Policies, and Processes - The organization must need to utilize "Web utilization inclusion affirmation structure" for taking the affirmation from every representative in the wake of perusing the arrangement. The affirmation structure guarantees that each representative appropriately read the arrangement and get it.

Affirmation

I peruse and comprehend the approach. I am concurred with the arrangement.

Worker name and signature________________________

IT administrator name and signature_______________________

Date_____________________

  • . Definitions and Term - None
3 0
4 years ago
Other questions:
  • A strain gauge with a 4 mm gauge length gives a displacement reading of 1.5 um. Calculate the stress at the location of the stra
    5·1 answer
  • A 0.40-m3 insulated piston-cylinder device initially contains 1.3 kg of air at 30°C. At this state, the piston is free to move.
    15·1 answer
  • Water is being heated in a closed pan on top of a range whilebeing stirred by a paddle wheel. During the process 30kJ of heat is
    11·1 answer
  • If a law enforcement officer stops a vehicle for a traffic violation and finds a front-seat passenger 18 years of age or older n
    14·1 answer
  • A tensile test was made on a tensile specimen, with a cylindrical gage section which had a diameter of 10 mm, and a length of 40
    15·1 answer
  • State whether the following statements are true or false. Provide a brief justification for your answer.
    5·1 answer
  • Trevor and Nick are taxi drivers. Trevor drives a taxi using diesel oil while Nick drives a taxi using LPG. Whose taxi will caus
    11·1 answer
  • A questiom for the big carb himself no cap
    7·1 answer
  • Segment AB is congruent to segment AB.<br><br> This statement shows the ______ property.
    7·1 answer
  • When adding two 8 bit binary numbers, which of the following statements is true?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!