What materials are used to make a steel headgear

Answers

Answer 1

Answer:

headgear or concrete structure A concise definition of a Headgear, is a steel or concrete structure constructed to facilitate the transfer of men, material and rock from underground as well as the housing of equipment and safety devices used for sinking and productionw

material used to make steel To make pure steel, iron and carbon are needed. On its own, iron is not very strong, but a low concentration of carbon - less than 1 percent, depending on the kind of steel, gives the steel its important properties. The carbon in steel is obtained from coal and the iron from iron ore.

Explanation:

i hope it helped it is from my science book


Related Questions

(problem is given by the image)

Answers

The program that prompts the user for three integers and displays their average as a floating point is given below:

The Code:

import java.util.Scanner;

public class ArithmeticSmallestLargest {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       int num1;

       int num2;

       int num3;

       int sum;

       int average;

       int product;

       int largest;

       int smallest;

       System.out.print("Enter First Integer: ");

       num1 = input.nextInt();

       System.out.print("Enter Second Integer: ");

       num2 = input.nextInt();

       System.out.print("Enter Third Integer: ");

       num3 = input.nextInt();

       sum = num1 + num2 + num3;

       average = sum / 3;

       product = num1 * num2 * num3;

       largest = num1;

       smallest = num1;

       if(num2 > largest)

           largest = num2;

       if(num3 > largest)

           largest = num3;

       if(num2 < smallest)

           smallest = num2;

       if (num3 < smallest)

           smallest = num3;

       System.out.println("The sum is " + sum);

       System.out.println("The average is " + average);

       System.out.println("The product is " + product);

       System.out.println("Largest of three integers is " + largest + " and the smallest is "+ smallest + ".");

   }

}

Read more about java programming here:

https://brainly.com/question/18554491

#SPJ1

Which of the following statements is an example of the Measurable requirement of SMART goals?

a.
I want to graduate.

b.
I want to graduate with a GPA of 3.0 or higher.

c.
I want to graduate with good grades.

d.
I want to graduate someday.

Answers

The answer is B, because smart in smart goal is specific, measurable, achievable, relevant, and time bound.

State two functions of a computer case?​

Answers

Answer:

Provides a standardized format for the installation of non-vendor-specific hardware.

Protects that hardware and helps to keep it cool.

Explanation:

The computer case serves two primary functions:

Protecting the internal components from damage, dust, and other environmental factors.Providing a framework to hold and organize the internal components and connect them to external devices and power sources.

What is a computer case?

A computer case, also known as a computer chassis or tower, is a housing that encloses and protects the internal components of a computer, including the motherboard, central processing unit (CPU), power supply, hard drives, and other peripherals.

The case is typically made of metal or plastic and is designed to provide a framework that holds the components securely in place and protects them from physical damage, dust, and other environmental factors.

Computer cases come in a variety of shapes and sizes, including full-tower, mid-tower, and mini-tower designs, and often include features such as cooling fans, front-panel ports, and tool-less installation mechanisms to make it easier to assemble and maintain the components inside.

Learn more about computer here:

brainly.com/question/15707178

#SPJ2

Within the manufacturing industry, there are fourteen subindustries. Which of the
following is one of these subindustries?

A) Shipping and warehousing.

B) Petroleum and coal products.

C) Automobile manufacturing.

D) Concrete and steel.

Answers

Answer: A or B i done this before but my memorys quite blurry i rekon doing A

Explanation:

A designer creates a mockup of a website homepage for a youth services nonprofit. They incorporate elements that add hierarchy to the design, make text easy to read, and add visual style. What visual design element are they using?

Typography

Iconography

Layouts

Symbology

Answers

Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

What in web design is a mockup?

An application or web page mockup is seen as a kind of a  static design that includes a lot  of the final design elements but is said to be not functional.

Note that A mockup often contains some placeholder data and is less polished than a live page. It is found to be helpful to break down each element of the definition.

Through the use of  website mockup can help you realize your vision and decide on design concepts before developers begin to work. A sketch is the first step in the web design process before moving on to a wireframe.

Therefore, Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

Learn more about visual design element from

https://brainly.com/question/19584310
#SPJ1

Define the three overarching domains that contain application software, system software and hardware layers along with the
layers of abstraction in each, and explain in detail how each of these layers, whether software or hardware, interacts with the
others. Explain your answer in 3-5 sentences.

Answers

Answer:

The three overarching domains that contain application software, system software and hardware layers are:

- The kernel: This is the lowest level of software, and it interacts directly with the hardware.

- User space: This is where most applications live, and it is separate from the kernel to protect the stability of the system.

- Shells and GUIs: These provide a way for the user to interact with the system.

The hardware layer is the lowest level, and it consists of the actual physical components of the system. The software layers sit on top of the hardware, and they are responsible for running the system. The application software is the highest level, and it consists of the programs that the user runs. The system software is in the middle, and it consists of the operating system and other utilities that manage the system.

Explanation:

Hope this helps!

The three overarching domains in computing are application software, system software, and hardware layers, which interact through standardized interfaces and protocols to execute tasks and processes seamlessly.

Overarching domains in computing represent distinct layers, where application software serves as the user-facing programs tailored to specific tasks, system software acts as a mediator managing essential system functions and services, and hardware encompasses tangible components like CPUs, memory, and devices.

These domains collaborate harmoniously through standardized interfaces and protocols, enabling seamless interactions that harness the combined power of software and hardware, cultivating a flourishing digital landscape with the artistry of functionality and innovation.

Learn more about overarching domains here:

https://brainly.com/question/31608948

#SPJ7

What command would you enter while in vi command mode to find the term Sam?

Answers

The command "/Sam"  would enter while in vi command mode to find the term Sam.

What is vi command?

Vi is the name of the standard editor included with the UNIX operating system.

A full-screen editor with two modes of operation, the UNIX vi editor:

Commands in the command mode that affect the file's behavior and, Text entered during the insert mode is added to the file.

Every character entered the command mode is a command that alters the text file being edited; a character may even trigger the vi editor to switch to insert mode. Every character entered during insert mode is added to the text in the file; insert mode is disabled by pressing the Esc (Escape) key.

Even though there are many vi commands, learning only a few of them is generally enough for beginners. This website includes a list of common vi commands to help such users. In the tables below, the most fundamental and practical commands are denoted by an asterisk (* or star). These instructions ought to become automatic with experience.

To get more information about  vi command :

https://brainly.com/question/9671960

#SPJ1

write a complete program that declares an integer variable, reads a value from the keyboard in that variable, and write to standard output a single line containing the square of the variable's value.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that complete program that declares an integer variable, reads a value from the keyboard in that variable.

Writting the code:

#include<iostream>

using namespace std;

int main()

{

//declare an integer variable

int n;

//read a value from the keyboard

//cout << "Enter an integer: ";

cin >> n;

//display the square of the variables value

//cout << "The square of the number entered is: ";

cout << n * n;

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

photosynthesis means​

Answers

Answer:

the process by which green plants and some other organisms use sunlight to synthesize foods from carbon dioxide and water.

Explanation:

What is e-learning
can anyone tell me in her/his own words

Answers

in my own words it’s learning new thing from electronics or digital resources

You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle’s database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don’t know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.

Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision-making.

Answers

A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:

Hello, Ms. Roye,

I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.

One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.

I would urge you to rethink your use of this version of Oracle

What is a Memo?

This refers to the written message that is usually used in a professional setting to communicate.

Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.

Read more about memo here:

https://brainly.com/question/11736904

#SPJ1

What is Another name for a digital artist
A programmer

b graphic designer

c project manager

d Manager​

Answers

Answer: B. Graphic designer

Explanation:

Programmers work with code, Project managers are in charge of planning and organizing different projects for people to do, and Managers manage staff workers.

Graphic designers primarily work on photo editing, video editing, designing logos for brands, etc.

Topology in networking essentially just means how the computers are interconnected with one another.

Answers

Answer:

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field buses and computer networks.

There are five types of topology in computer networks:

Mesh Topology.

Mesh topology is a type of networking where all nodes cooperate to distribute data among each other. This topology was originally developed 30+ years ago for military applications, but today, they are typically used for things like home automation, smart HVAC control, and smart buildings.

Star Topology.

A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.

Bus Topology.

A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.

Ring Topology.

A ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.

Hybrid Topology.

A hybrid topology uses a combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.

.

.

.

Please mark as brainliest.

Answer: In network layout, in terms of drafting RFP's, how computers are interconnected with each other physically, is a physical topology. In terms of how everything is connected to each other with the cables, on paper, that is a logical topology.

Explanation: Physical Topology is related to how the network actually appears as if you were in the room, looking at it. While logical topology, is usually a schematic on paper, showing how all of the devices are connected, which ports are they connected to, what are the Ip's, Mac addys, and such.

Give Seven characteristics of a candidate key.

Answers

Answer: A candidate key is a key selected from the set of super keys.

Generally, a candidate key does not have null or empty values and consists of one or many attributes.

According to the above-mentioned student table, the id and phone do not have any redundant attributes.

A candidate key does not have null or empty values and consists of one or many attributes.

There can be more than one candidate keys for a table.

A candidate does not have any redundant attributes.

A candidate key is a super key with no redundant attributes.

Explanation:I hope this helps

Which computer-related job duties belong to the discipline of information
technology?
O A Planning, creating, testing, and maintaining applications used by
devices
OB. Planning, creating, testing, and maintaining physical computer
systems
OC. Analyzing organizational operations to find opportunities for
improvement
OD. Analyzing computer systems to protect computer networks from
cyber threats
SUBMIT

Answers

Answer:

The answer is D, Analyzing computer systems to protect computer networks from cyber threats.

Explanation:

Tormund wants to build a proxy firewall for his two computers, A and B. How can he build it?
A. by connecting computer A with computer B and computer B to the proxy firewall
B. by connecting a different firewall to each computer
C. by connecting computer A to computer B through the proxy firewall
D. by connecting only one of the computers to the firewall

Answers

Answer:

The most effective way for Tormund to build a proxy firewall would be to connect computer A to computer B through the proxy firewall. This would ensure that all traffic between the two computers would go through the firewall, and that the firewall would be able to filter and block any unwanted traffic. Additionally, this setup would allow Tormund to easily monitor and manage all traffic going between the two computers.

Explanation:

Hope this helps!

a functions is where a relations has only one _ for every _.

Answers

Answer:

A function is where a relation has only one output for every input.

Explanation:

Hope this helps :)

Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.

Sample Run:

Enter the Yards: 3
Enter the Feet: 2
Enter the Yards: 4
Enter the Feet: 1

Sample Output:
Yards: 8 Feet: 0

Answers

The program accepts separate fabric lengths in feet and inches and displays the total fabric length in feet and inches.

What is programming?

Creating a set of instructions that tells a computer how to perform a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

The Python 3 program is as follows:

feet_1 = int(input('length in feets : '))

Prompts user to enter feet length of fabric 1

inch_1 = int(input('length in inch : '))

Inch length of fabric 1

feet_2 = int(input('length in feets : '))

Feet length of fabric 2

inch_2 = int(input('length in inch : '))

Inch length of fabric 2

inch_sum = inch_1 + inch_2

Sum of the inches

inch_left = inch_sum%12

Remainder in inches after converting to feets

inch_to_feet = inch_sum // 12

Whole number of the converted inch sum

feet_sum = feet_1 + feet_2 + inch_left

Total sum of the feet length

print('Feet : %d Inches : %d' %(feet_sum, inch_left))

Display the sum

Thus, this can be the format for given scenario.

For more details regarding programming, visit:

https://brainly.com/question/14368396

#SPJ1

Does the source MAC address match your PC interface?

Answers

Answer: Yes, it does

Explanation:

Which of the following network topology is most expensive
to implement and maintain?

Answers

The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.

What is Network topology?

Network topology is known to be a term that connote the setting of the elements that pertains to a communication network.

Note that Network topology can be one that is used to state or describe the pattern of arrangement of a lot of different types of telecommunication networks.

Therefore, The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.

Learn more about network topology from

https://brainly.com/question/17036446

#SPJ1

Which of the following is the most expensive network topology?

(a) Star

(b) Mesh

(c) Bus

how to find area of square

Answers

Answer: area= s²

Explanation: When finding an area of a square, squares all their sides of the same length. You only need two sides to get the area inside. Since it is the same number, you are multiplying the number by itself, hence why it is squared.

So, you basically get the measurement of one side of the square, and multiply it by itself

Answer:  area=- s2

Explanation:

What
are the
Contituent of a c p u

Answers

It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor. The ALU performs arithmetic operations, logic operations, and related operations, according to the program instructions.

Which of the following is true about primitive data types?

A. They can only represent numeric data.
B. Primitives have built in methods.
C. They can hold words and numbers at the same time.
D. They hold only one piece of data at a time.
E. There are a total of 2 primitive types.

Answers

Answer:

They hold only one piece of data at a time.

Explanation: I got it right

Knowledge Check
Question 1 of 5

What is an unexpected life event?

Answers

Events that take individuals by surprise as they do not know that they are going to happen, they are unplanned.


Which is the best defense against ESD?
< Prev
Stand-off on motherboard
ZIF socket
Ground strap

Answers

The best defense against ESD is known to be called Ground strap.

What does grounding strap mean?

The ground strap is known to be a term that connote the grounding connection that tends to runs from a vehicle's engine to the area of  the negative battery terminal or that of the chassis.

Note that in the case above, both the negative battery terminal as well as the chassis of a said vehicle are known to be grounded.

Therefore, based on the above, one can say that the best defense against ESD is known to be called Ground strap.

Learn more about Ground strap from

https://brainly.com/question/14989495

#SPJ1

why are there different types of input devices?​

Answers

Answer: different inputs are made for different devices for hearing

Explanation:

1. For the Boolean functions E and F, as given in the following truth table
XYZ E
F
1
1 0
0
1
1
0
0
0
1
1
1
0
1
1 1 0
0
0
0
0
1
1
1
1
00
0
1
1
0
0
0
0
1
0
1
0
1
1
XYZ
XYZ
बोर
xyz
XFF
XFI
XYZ
xyz
Note
letters in bold mean that it's a compliment.
a.
List the minterms and maxterms of each function
b. List the minterms of E and F
c.
List the minterms of E+ F and E.F
d. Express E and F in sum of minterms algebraic form.
e. Simply E and F to expressions with a minimum of literals

Answers

Answer:

xxxxxxxxxxxxyyyyyyyyyyyyppppppppp537888264778

Design a modular program IN JAVA that asks the user to enter the monthly costs for the

following expenses incurred from operating his or her automobile:

loan payment,

insurance, gas, oil, tires, and maintenance. The program should then display the

total monthly cost of these

expenses, and the total annual cost of these

expenses.

Answers

A modular program IN JAVA that asks the user to enter the monthly costs for the given expenses incurred is as detailed below.

How to design a Modular Program in Java?

Module main()

             // declare variablesDeclare Real loanpayment, insurance, gas,

             oil, tires, maintenance,sum

             // Display an intro message.

             Call showIntro()

             //getting loanpaymentexpense as input

             Display “Enter expense incurred from loan payment:

             “Input loanpayment

             //getting insurance expense as input

             Display “Enter expense incurred from insurance:

             “Input insurance

             //getting gasexpense as input

             Display “Enter expense incurred from gas:

             “Input gas//getting oil expense as input

             Display “Enter expense incurred from oil:

             “Input oil//getting tires expense asinput

             Display “Enter expense incurred from tires:

             “Input tires

             //getting maintenance expense asinput

             Display “Enter expense incurred from maintenance:

             “Input maintenance

             Sum = loanpayment +  insurance + gas + oil + tires +

             maintenance

             Call monthlyCost(Sum)

             Call annualCost(Sum)

             Call s h o w E n d M s g ()

End main

Module showIntro()

              Display “A program to calculate costs for expenses incurred

              from operating automobile”

End showIntro

monthlyCost(Real Sum)

               Display “Total monthly cost of expenses incurred from

               operating automobile: “, Sum

End monthlyCost

annualCost(Real Sum)

                Display “Total annual cost of expenses incurred from operating

                automobile: “, (Sum * 12)

End annualCost

Read more about Java program at; https://brainly.com/question/18554491

#SPJ1

Can you please give a layman's explanation of the sigmoid function and its applications in machine learning? Why use a sigmoid function instead of, say, a simple Z-score for data normalization?

Answers

The sigmoid function and its applications in machine learning is that Sigmoid Function is one that act as a kind of an activation function in regards to machine learning which is said to be used to input any form of non-linearity in a machine learning model.

One can say that it decides the type of value that one can pass as output and what cannot be pass.

Why use a sigmoid function instead of, say, a simple Z-score for data normalization?

The main reason that one can say is the key reason why people make use of the sigmoid function is due to the fact that it is one that exists between (0 to 1).

So, it is one that is used for models where a person can have to be able to know the probability as an output.

Therefore, The sigmoid function and its applications in machine learning is that Sigmoid Function is one that act as a kind of an activation function in regards to machine learning which is said to be used to input any form of non-linearity in a machine learning model.

Learn more about machine learning from

https://brainly.com/question/25523571
#SPJ1

Make five E-learning questions
make any five questions in your own words

Answers

Five e-learning or online learning questions are:

When did e-learning develop?What are the strategies for e-learning?What are the advantages of e-learning?What are the demerits of e-learning?Is e-learning the same as traditional learning?

What is E-Learning?

E-learning is a learning approach that is based on formalized instruction but uses electronic resources. While education can take place in or out of the classroom, computers and the Internet are the primary components of E-learning.

Online learning assists students in developing and communicating new ideas. Aside from school, you have the opportunity to improve your talents and gain information. One of the most important aspects of e-learning is that it assists students and teachers in developing advanced abilities.

The following are the benefits of online courses:

Online classes are practical.Online classes provide convenience.Online courses deliver education to your doorstep. Online courses provide more personalized attention.Online classes allow you to meet new individuals.Online courses provide you with real-world skills.

Learn more about E-Learning:
https://brainly.com/question/2014724
#SPJ1

Other Questions
An ion of aluminum has a charge of 3 . the ion contains 10 electrons. how many protons does a neutral atom of aluminum possess? a. 3 b. 10 c. 13 d. 16 Based only on the information given in the diagram, which congruencetheorems or postulates could be given as reasons why ACDE=AOPQ?Check all that apply.AAEA. LLB. AASC. SASD. LAE. HLF. ASA Choose the true statement about african american culture and politics in the 1920s. Solve For x[tex] \tt \red{4x + 2 = -8}[/tex]Thank uh ~ Plastic or Wood?Two students in a science classroom are debating about whetherthe tables are made of wood or plastic. As the teacher passes by,she suggests, "Use cell theory to find the truth!" How did andrew jackson appeal to voters during the election campaign of 1828? question 3 options: he used slogans, posters, and songs. he wrote articles and gave speeches. he traveled to every state to meet with legislators. he had a campaign train that toured the country. Two primary acid-base disorders that are present independently are referred to as:____. What is the purpose of the NASA Star Finder?(1 point) . To observe stars and other distant objects in space. To see how constellations change positions in the sky throughout the year. To include new stars and constellations that are discovered every month. To provide images of constellations from month to month. Brittney is 4 years older than Dakota. The variable b stands for Brittney's age. Which expression stands for Dakota's age?A. 4bB. 4 - bC. b + 4D. b - 4 Company k incurs a $22,000 deductible expense. compute the current year tax savings from the deduction assuming that:_________ Write a linear cost function for the situation. Identify all variables used.A parking garage charges 3 dollars plus 45 cents per half-hour.Identify all variables used. Choose the correct answer below.Part 2 of 2O A. C(x) represents the number of hours the parking garage was used after paying x dollars.B. C(x) represents the number of half-hours the parking garage was used after paying x dollars.C. C(x) represents the cost for using the parking garage for x half-hours.OD. C(x) represents the cost for parking x cars in the parking garage.A linear cost function for the situation is C(x) =(Use integers or decimals for any numbers in the expression.) Need the answer badddd without this app Id be screwed To discover the plasma concentrations that produce the desired drug effect without toxicity means to establish the drug's:______. A _____ is a coherent explanation or interpretation of one or more phenomena, while a ____ is a specific prediction about a new phenomenon that should be observed if a particular theory is accurate. The specification for 100basetx calls for utp cabling using __________ or better rated cabling. What part of the policy-cycle determines who will deal with a particular issue and when? What does your answer indicate about the total resistance of a parallel circuit with three resistors, compared to the resistance of the circuit with a single resistor? _____ is the uniform system of reporting scientific measurement developed through international cooperation. The business case for why companies should act in a socially responsible manner includes? eight plus the quotient of a number and 3 is 75