1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
2 years ago
15

Tools used to build a bridge​

Computers and Technology
1 answer:
Sati [7]2 years ago
6 0

Aerial Lifts,

Vertical Masts and Hydro Platforms,

Telehandlers,

Excavators,

Skid Loaders,

Backhoes,

Cranes,

Air Compressors.

If It was helpful, can you make me brainliest please?

You might be interested in
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.
Norma-Jean [14]

Answer: False

Explanation: Tablet computer is a type of the smartphone which is portable and has computer functions. It can be used for the data accessing, videos, pictures etc. They also have a internal storage for the storing of the data.So, the statement given is false.

Thin client is the device that persist these features mentioned in the question.It is a small computer without fan and any hard-drive for the storage.It is device that has a connection along with a network,.

5 0
3 years ago
You are studying at the library and someone at your table has some great study material. both of you have an ipad with you. you
myrzilka [38]
C.apple domain is to use the personal sharing files from one computer to another computer
3 0
3 years ago
You are designing software for elderly people. Which two features can you
romanna [79]

give instructions in both text and audio formats

7 0
3 years ago
Select the correct answer.
oee [108]

Answer:

D

Explanation:

3 0
3 years ago
Other questions:
  • Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash
    15·1 answer
  • )Dynamically allocate an object of Banana, using the pointer variable daco.
    6·1 answer
  • What is one visual indication that a usb port can be used to charge a mobile device?
    13·1 answer
  • List two reasons why “buying a computer is no easy task” ?
    12·2 answers
  • The ____ command will confirm the system directory that you are currently in
    13·1 answer
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • I need help, whoever gets it correct will get brainliest
    7·1 answer
  • Hi am feeling really happy just passed a test after a lot of tries :-)
    5·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!