1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
2 years ago
10

What construction work is the tender for​

Computers and Technology
2 answers:
Agata [3.3K]2 years ago
7 0

Answer:

A tender is a submission made by a prospective supplier in response to an invitation to tender. It makes an offer for the supply of goods or services. In construction, the main tender process is generally for the selection of the contractor that will construct the works.

Explanation:

Luden [163]2 years ago
7 0
Government construction projects.


Tendering Process under construction is a process of submitting a proposal to undertake government construction projects. Depending on the language in the bid proposal the construction companies make their bids for submission, and if accepted, a legally enforceable contract is created.23 Mar 2017
You might be interested in
The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do
sleet_krkn [62]
I think False...

I hope this helps
8 0
2 years ago
Why crt and plasma are not used in laptop ?​
AlekseyPX

Answer:

Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.

Explanation: pls mark my answer as brainlist

6 0
2 years ago
Which risk mitigation framework allows scope for research and acknowledgement for risk mitigation?
hjlf
The answer is that by establishing the framework<span> for the management of risks, the basic parameters within which risks must be managed are defined. Consequently, the </span>scope<span> for the rest of the </span>Risk Management<span> process is also set. </span>
6 0
3 years ago
Read 2 more answers
Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.
Doss [256]
Jim is the main antagonist while Edward is the main protagonist of the movie.
8 0
2 years ago
Which new jobs will be in demand in the next 20 years
s2008m [1.1K]
The answer is Data Jobs, Data Analysis, Solution Architecture, Software Engineering and Product Managers, there is many more but there's just a few. Hope I helped! :)
3 0
3 years ago
Other questions:
  • How can supply and demand for different careers affect job stability and income?
    6·1 answer
  • Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​
    6·1 answer
  • As with country citizenship, with digital citizenship comes _____.
    14·2 answers
  • Before a program written in c can be executed on a computer, what step is required to be done first?
    7·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
  • Which option correctly identifies if the researcher’s approach was the best choice in the following scenario and explains why?
    10·2 answers
  • HELP MEEE PLEASE!!!
    11·1 answer
  • An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data elemen
    7·1 answer
  • In python 3.17 LAB: Convert to dollars
    14·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!