1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
2 years ago
10

Como se llaman las herramientas y maquinas pque utilizan para hacer cosas artesanales

Computers and Technology
1 answer:
lakkis [162]2 years ago
8 0

Answer:

Entre los principales útiles que maneja destacan las gubias, cuchillas de acero inoxidable, un tornillo de banco, sierras manuales, escofinas, limas y hachas, todas de varias capacidades y medidas.

You might be interested in
Technology trends in education play a key role in a student’s: social life. motivation. career readiness. job search.
skelet666 [1.2K]

Answer:

job search

Explanation:

job search bc you can look for jobs that are avalible online.

4 0
3 years ago
Read 2 more answers
"You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can b
svet-max [94.6K]

Answer:

Docking Station is the correct answer of the following question.

Explanation:

A docking station is a technology system that is able to communicate capacities touchscreens with the other machines with few or no work.

The docking station is a system connecting a machine to many devices.

  • The docking station lets you attach to gadgets you have not been able to use in the future.
  • Not always connected with machines are docking station items such as sloped-panel displays and interchangeable lens cameras.
8 0
3 years ago
When is the redo log buffer written to the redo log file?
natka813 [3]

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

5 0
3 years ago
Plz help me i need it asap
Ulleksa [173]

Voyager

Shortly after the Pioneers made their flybys, the Voyager1 and Voyager 2 probes followed. They made many important discoveries aboutJupiter and Saturn, including rings around Jupiter and the presence ofvolcanism on Jupiter's moon, Io. Voyager went on to make the first flybys ofUranus, where it discovered 10 new moons, and Neptune, where it found thatNeptune actually weighs less than astronomers thought. Both Voyager crafts have enough power to keep transmitting radio signals until at least 2025, and are now exploring the very edge of the solar system and beginning of interstellar space. Voyager 2 is currently the farthest man-made object from Earth, at more than a hundred times the distance from the Earth to the sun, and more than twice as far as Pluto.

I hope this helps chu

4 0
3 years ago
Write a java program as follows Write a method called powOfTwo that takes an integer as parameter, computes, and outputs it’s sq
Kisachek [45]

Answer:

public static int powOfTwo(int input) {

 return input*input;

}

You will have to call this method in main
for printing it, write

System.out.println(powOfTwo(your number));

in public static void main(str[]args) {

}

8 0
2 years ago
Other questions:
  • (GAME DESIGN)
    15·1 answer
  • Search engines enable you to
    9·2 answers
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • Which of the following IS true about usnig the Hatch command ?
    15·1 answer
  • Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
    15·1 answer
  • So i'm trying to figure out why this code wont run can anyone help me
    8·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • An argument does not always have to be made in words. A piece of music
    12·1 answer
  • What does the word strained mean as it is used in paragraph 16 the story is from where the red fern grows but this are the answe
    10·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!