1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
3 years ago
13

I. Direction: Write TRUE if the statement shows Principles of Facility Planning, and FALSE if

Computers and Technology
1 answer:
mr_godi [17]3 years ago
5 0

The following are either true or false in respect of Principles of Facility Planning/Management.

No.  1 is True. No. 2 is False. No. 3 is False. No. 4 is True. No. 5 is True.

<h3>What are the Principles of Facility Planning?</h3>

The main principles of facility planning are given below:

  • The planner must coordinate the plans with other government agencies that provide facilities
  • look at other options before selecting the final location for the facility
  • give adequate justification for the proposed facility
  • develop a management plan that includes design priorities and operational strategies
  • use the Life-Cycle Cost principles while designing
  • ensure that it is in line with the organisations plans/goals etc

Please see the link below for more about Facility Management:

brainly.com/question/5047968

You might be interested in
I need Help!!<br> 4. Explain the importance of including negative space as part of a design.
vova2212 [387]
Negative space is the space between, within and surrounding an object in an image. The positive space is the focus of the image, the object itself, but the negative space is just as important. It shares edges with the positive space, defining the outline of the object and creating proportion
5 0
3 years ago
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynom
solniwko [45]

Answer:

Explanation:

that is correct 1234

7 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Which of the following is NOT an advantage of owning a car?
AnnyKZ [126]

Smaller down and monthly payments than leasing a car

Option A.

<u>Explanation:</u>

If you lease a car, then the amount of money that a person has to pay in the form of monthly payments and installments is less when compared to when a person owns a car.

When you own a car, the monthly payment made is more than the monthly payments compared to when the car has to be leased. This is the disadvantage of owning a car, that the payment is more to be made.

8 0
4 years ago
Other questions:
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    12·1 answer
  • If you and another person want to encrypt messages, what should you provide that person with?
    10·1 answer
  • Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research
    11·1 answer
  • The means by which an operating system or any other program interacts with the user is called th
    6·1 answer
  • What command prompts should be used to assign an IP address to:
    9·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
    11·1 answer
  • How major is the technology problem in the United States?
    15·1 answer
  • Apex
    5·2 answers
  • The auxiliary device used to store large volume of data and program for future is called​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!