1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

During working hours an electrician should not wear

Computers and Technology
1 answer:
Arlecino [84]3 years ago
3 0
B. a wristwatch or rng because you and get electrocuted 
You might be interested in
NEEDED ASAP
kogti [31]

Explanation:

1. special key combination that causes specific commands to be executed typically shortcut keys combine the ctrl or alt keys with some other keys.

2. 5 example of shortcut keys are:-

  • 1. ctrl + A - select all
  • 2.ctrl + B - bold
  • 3. ctrl + C - copy
  • 4. ctrl + U - under line
  • 5. ctrl + v - paste

3. (i) open the start menu

(ii) open Windows task manager

(iii) close the currently active program

(iv) replace

(v) align center

4. the three importance of shortcut keys are :

  • efficient and time saving :- using shortcut make you more efficient at doing certain task on your computer .
  • multi-tasking :- being a multi Tasker is something required in life.
  • health benefit :- cutting down on your mouse usage by using keyboard shortcut can help reduce the risk of RSI (Repetitive Syndrome Injury).

5. shortcut keys are very helpful because it take less time. keyboard shortcuts are generally used to expedite common operation by reducing input sequence to a few keystrokes.

8 0
3 years ago
c) Do hardware purchases or salaries for IT workers demand a greater share of the total cost of the ownership of the IT infrastr
atroni [7]

Answer:Yes, with increase in the need for IT, and the constant improvements in IT, there is a need to recruit Qualified IT professionals who are knowledgeable.

With new technologies developing with a fast pace,there will be a constant need to invest in IT hardwares in order to meet with the increasing challenges.

Explanation:IT(Information technology) is a term used to describe the processes through Information is sent from one point to another through one or more media.

The field of Information technology is constantly evolving with several improvements taking place around the globe, Medium sized companies will need to constantly make expenditures on both the IT infrastructures and the IT professionals both as permanent employees or as contracted experts.

6 0
4 years ago
Read 2 more answers
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has
OLEGan [10]

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   //initialize the variables

   int n = 5;

   int j=1;

   // for loop

   for(;j<=n;j++){

       cout<<"*";  //print the '*'

   }

}

Explanation:

Create the main function and declare the variable n with the value 5 and initialize the variable j with zero.

take a for loop for executing the statement again and again until a condition is not false.

Syntax for loop:

for(initialize; condition; increment/decrement)

{

 statement;

}  

we can initialize the variable outside as well but the semicolon always present in the loop otherwise compiler gives the error.

for example:

int i=0;

for(; i<4; i++){

  statement;

}

The condition put in the original code is j <= n and n has the value 5. so, the loop executes 5 times and inside the loop, write the print statement for print the character '*'.

6 0
4 years ago
Other questions:
  • When you display the backstage info section, you cannot manually change which property
    10·2 answers
  • The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:
    10·2 answers
  • I can't see the answer
    13·2 answers
  • A display that is thin, flexible, light, and easy to read in all types of light is
    9·2 answers
  • 2. (8 points) When creating the Academic Database, there were several instances of data
    11·1 answer
  • Why do we say that IP provides ""best-effort"" service?
    11·1 answer
  • Which output device would a teacher use to show
    13·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • What is the address of the first SFR (I/O Register)​
    11·1 answer
  • Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!