1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
5

Hand tools are generally classified based on :​

Computers and Technology
1 answer:
makkiz [27]3 years ago
4 0

Categories of hand tools include wrenches, pliers, cutters, files, striking tools, struck or hammered tools, screwdrivers, vises, clamps, snips, hacksaws, drills, and knives. Outdoor tools such as garden forks, pruning shears, and rakes are additional forms of hand tools. Portable power tools are not hand tools.

You might be interested in
Can someone please help me...pls.. how do u delete an account on this app(brainly)..pls help fast​
Basile [38]

Explanation:

The option to delete your account can be found in your Profile Settings under Privacy. Click on the box labeled I want to delete my account, and the request will be sent for the account to be deleted.

6 0
3 years ago
Read 2 more answers
A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
larisa [96]
192.168 suggests class C networks which have a 24 bit netmask (255.255.255.0) but you haven't provided enough info, like the netmask of a working machine, to be definite.
3 0
3 years ago
The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
Andrew [12]

Answer:

False

Explanation:

IPv4 address are composed of four octets (8 bit numbers), ranging from <em>0.0.0.0 to 255.255.255.255</em>

All those 32 bits, in decimal notation, can form a total of

2^{32} = 4,294,967,296 different addresses.

Being more than 4 billion addresses and ignoring that some addressesare reserved for special uses, even present human population almost doubles that number.

So it is safe to state that IPv4 addresses is <u>not </u>enough to give every blade of grass its own IP.

8 0
3 years ago
Lisa and her husband would like to buy a house soon. She continuously pays bills late. How do her actions affect her and others?
stiks02 [169]
Well actually it affects her credit. Home owners would not want to sell a house to someone who doesn't pay bills on time. It shows he/she is unreliable

3 0
3 years ago
Read 2 more answers
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
Other questions:
  • What was one of the main purposes of the first computer systems?
    11·1 answer
  • In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
    7·1 answer
  • You recently discovered that Marketing1 can connect to Admin1, and Admin1 can connect to Marketing1, but neither of these comput
    11·1 answer
  • Which cell formatting is most likely to use $?
    5·1 answer
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • Essay about evolution of media shaped the values and norms of the society
    11·1 answer
  • What is a disruptive technology? Give an example of an aspect of society that has been impacted by technological change.
    6·1 answer
  • What happens when the electrons flowing through the light bulb change direction?
    11·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
  • Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!