1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
2 years ago
9

How much weight does a headgear need to carry

Computers and Technology
1 answer:
hram777 [196]2 years ago
4 0

Answer:

The model will have a mine winch, shaft headgear, and a lift cage.

Explanation:

You might be interested in
It can be hard to get close enough to photograph animals in the wild true or false
marysya [2.9K]

Answer:

True

Explanation:

8 0
3 years ago
Read 2 more answers
Four ways to improve the performance of a hard disk include.
erik [133]

Answer:

Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.

7 0
2 years ago
What three components should be included in a computer that is used to create TV commercials and music videos? (Choose three.
Vikki [24]

The three components is a specialized video card, large and fast hard drives and specialized audio card.

8 0
3 years ago
Read 2 more answers
What are the similarities and differences in an electronic crime scene as compared to a traditional crime scene?
geniusboy [140]
Traditional crime scenes have physical evidence while electronic crime scenes have digital evidence such as IP address, geolocation, and user data.
8 0
3 years ago
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the left are if a slide in a presentation called
    15·1 answer
  • Using a personal computer to produce high quality printed documents
    8·1 answer
  • What do vector handles point at?
    13·2 answers
  • sqrt is being defined as a variable name, how do I get its math function to... well... function? (Python)
    11·1 answer
  • What are the most common types of cables in a network?
    6·1 answer
  • Write smallest to largest: Byte, bit, MB, PB, GB, nibble
    12·2 answers
  • PLEASE ANSWER!! If my pixel has an RGB value of (R - 150, G - 0, B - 100), what is the dominant value? Why?
    14·1 answer
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
  • Select the correct answer.
    5·1 answer
  • What problems do you see in the process of transacting business online
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!