1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

During working hours an electrician should not wear

Computers and Technology
1 answer:
Arlecino [84]3 years ago
3 0
B. a wristwatch or rng because you and get electrocuted 
You might be interested in
What protocol allows us to use a domain name like .com instead of an ip address?
san4es73 [151]
The answer is DNS (Domain Name System)

IP addresses are difficult to remember and therefore, the internet allows you to specify a computer using a host name. The same case happens to DNS. It maps domain names to IP addresses. Domain names are alphabetic making them easier to remember.



4 0
3 years ago
What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
Sveta_85 [38]
The answer is a screensaver
5 0
3 years ago
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Maru [420]

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here brainly.com/question/14407522

#SPJ4

5 0
2 years ago
I think these might be the answers but im not to sure, so am I right? or wrong? please help
mina [271]
Number 1 and 4 are the same? I agree with your answers.
4 0
3 years ago
Read 2 more answers
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the<br><br> stored program concept?
    8·1 answer
  • What savings account has the best rate of return on his interest
    12·1 answer
  • A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
    12·1 answer
  • Two technicians are discussing bleeding air from the brake hydraulic system. Technician A says to depress the brake pedal slowly
    10·1 answer
  • What is electrical induction?​
    11·2 answers
  • Add an array, which will store the most recent 5 recent transactions. For the array, add an insert function which will store the
    10·1 answer
  • Write code for iterative merge sort algorithm. It is also known as bottom-up merge sort. There should not be any recursive call
    14·1 answer
  • What happens when a user clicks the question mark at the top of the Backstage view?
    14·2 answers
  • Six security issues and six descriptions are shown below.
    11·1 answer
  • Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!