as a rule, is a leak is found what should be done

Answers

Answer 1

Answer:

Refrigerant leaks detected at compressor crank 

Explanation:


Related Questions

Which popular video game franchise has released games with the subtitles World At War and Black Ops?

Answers

Answer:

Call of duty i think has released those games

Answer:

IT WAS CALL OF DUTY

Explanation:

Python 4.5 code practice

Answers

Answer:

"Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:"

"#1: you entered _____"

"When DONE is entered, the total number of words entered should be printed in this format:"

"A total of ___ words were entered"

count = 0

data = input('Please enter the next word: ')

while data != "DONE":

   count = count + 1

   print("#" + str(count) +": You entered the word " + data)

   data = input("Please enter the next word: ")

   

print("A total of "+ str(count) + " words were entered.")

Explanation:

we are counting starting from 0 when the user inputs a word the code then counts the word and stores is as data and continues until the user inputs DONE

please help me with this. this my past homework and it's already stressing me out ehehe so it would make me happy if someone helped me :DD , please help me with atleast 5? thank you sm!​

Answers

Answer:

14. editor

8. managers

12. news

5. nameplate

10. dummy

For what was the simulation game, America's Military, used?

Answers

America's Army, army training simulator and electronic game used for army recruitment and training. It was created in 2002 by Lieut.

You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing something sneaky on the company's employee portal and has authorized you to hijack his web session so you can investigate.

Your task is to hijack a web session as follows:

a. On IT-Laptop, use Ettercap to sniff traffic between the employee's computer in Office1 and the gateway.
b. Initiate a man-in-the-middle attack to capture the session ID for the employee portal logon.
c. On Office1, log in to the employee portal on rmksupplies using Chrome and the following credentials: Username: bjackson Password:
d. On Office2, navigate to rmksupplies and use the cookie editor plug-in in Chrome to inject the session ID cookie. Verify that you hijacked the session.

Answers

Answer: A, it's the most professional way or C but I'd choose A

Define Auxiliary memory?​

Answers

Answer:

An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes. :)

An Auxiliary reminiscence is referred to as the bottom-value, highest-area, and slowest-method storage in a laptop system. it's miles wherein programs and facts are preserved for long-time period storage or when now not in direct use. The most standard auxiliary reminiscence devices used in computer structures are magnetic disks and tapes.

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x
350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
a.
a
Select one:
Image 1 is less sharp and has a smaller file size than image 2.
O b. Image 2 is less sharp and has a larger file size than image 1.
O c. Image 1 is sharper and has a larger file size than image 2.
O d. Image 2 is sharper and has a larger file size than image 1.
Clear my choice

Answers

The true statement regarding the two (2) bitmap images is: C. Image 1 is sharper and has a larger file size than image 2.

What is a bitmap image?

A bitmap image or bitmap image file (BIF) is also referred to as a raster graphic and it is generally made up of bits or dots that are called pixels.

Additionally, it is dependent on the resolution (size) of an image file and as such it becomes blurry when enlarged.

In this scenario, image 1 would become sharper and larger in size than image 2 when the original bitmap image files are increased by 25 percent.

Read more on bitmap image here: brainly.com/question/25299426

Which would be considered a peripheral device?

A. a printer that can be connected from outside the computer to communicate with it

B. a CPU

C. RAM

D. an internal hardware part like a motherboard or hard drive

Answers

Answer:

D is the correct answer of this question

write down same applacations of AI in agrilcaltural health education and bussness​

Answers

Answer:

Crop and soil monitoring.

Insect and plant disease detection.

Livestock health monitoring.

Intelligent spraying.

Automatic weeding.

Aerial survey and imaging.

Produce grading and sorting

Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detection system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution

Answers

The  solution to the issue above is to use Virtual firewall.

What is intrusion detection prevention systems?

The Intrusion detection systems (IDS) and intrusion prevention systems (IPS) is known to be a kind of system that often look into the network of a person.

It is often set up to identify the different incidents and logging information about them, hindering incidents, and reporting any issues to security administrators.

See options below

a. Virtual firewall

b. Next-generation firewall (NGFW)

c. Appliance firewall

d. Commercial software firewall

Learn more about intrusion prevention system from

https://brainly.com/question/14284690

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Answers

Answer:

15 and b is 20

Explanation:

Answer:

a = 120 and b = 60

Explanation:

a++ means a = a+1

b*=a is the same as b= a*b

After plugging in the variables,

Here are the results in order:

a = 6;

b = 60;

a = 120;

We only keep the nearest declared value of the variable, so "a" would equal 120 and "b" would equal 60.  

How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices

Answers

Answer:

A small screen limits the information that can be legibly displayed. While designing, text and images can quickly consume the limited screen space, causing a trade-off between content and user interactions. Given that smartphones are equipped with touch-based interfaces that allow intuitive and dynamic interactions, an increase in screen size offers a larger surface for interactions and a greater sense of controllability. Large screens also enable the utilization of various communication modalities.

Explanation:

I hope this helps!


1. What is the difference between a group and a topic?

Answers

What is the difference between group and a topic ?

GroupYou can publish a comment or question to the main community feed or to a group of which you are a member. Members with a common interest can form group within the wider community to form a small community around that topic and group posts will only appear in the feeds of other group members, not in the general community feed.TopicTopic work similarly to hashtags. Use the "+" symbol to the left of the Post/Ask button to add a topic (tag) to your post or question so that it can be classified along with other related posts and topics are a way to group posts and queries with similar content, but they don’t bring everyone with the same interest together in one place and this is where the groups come in!

what dose a compress pictures command do ?

Answers

Answer: I reduces the size

Explanation: cropped areas of pictures are saved by default, which adds to the file size. If your using PowerPoint then it can reduce the file size by compressing pictures, like lowering their resolution, and deleting cropped areas.

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Choices

120 and 60
60 and 30
5 and 10
30 and 60

Answers

Answer:

30 and 60

Explanation:

Write a console application that requests the user to enter the name of their Pet and the year their pet was born.Calculate the age of the pet and display the name and age of the pet.

Answers

The console application that requests the user to enter the name of their Pet and the year their pet was born and calculate its age is as follows:

from datetime import date

def nameAndAge(x, y):

   today = date.today()

   age = today.year - y.year - ((today.month, today.day) < (y.month, y.day))

   return f"The name of your pet is {x} and the age is {age}"

   

# Driver code

print(nameAndAge("mike", date(1997, 2, 3)), "years")

Code explanation

The code is written in python.

we have to import date from datetime module.We declared a function named  "nameAndAge". The arguments of the function are the users input which are the name and date of birth of the pet.We store todays date in the variable called "today".Then we calculate the age of the pet.The next line of code, we returned the name and the age of the pet base on the users input.Finally, we call the function with the print statement.

learn more on python here: https://brainly.com/question/25285677

large and fast disks should be used for as doing so will ensure work is done as quickly as possible?

Answers

Answer:  Well it depends, sometimes for a hard drive if you are using for an example, that would not really affect the performance on how big is it. But I think that it could impact the performance in a good way but maybe some people think that it's not so....

Explanation:

Well, that varies. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.

What is the performance?

A play, concert, or another type of entertainment is staged or presented as a performance. It can also be described as the process or action of doing or completing a deed, task, or function. A qualitative methodology is known as "performance research" uses

The subject and method of the experiencing body are placed in time, place, and history. Instead of abstract or reductive encounters, the performance paradigm calls for a more direct experience, primarily through facework. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.

Therefore, Well, that varies. For instance, depending on how big the hard disk is, performance

Learn more about performance here:

https://brainly.com/question/15466511

#SPJ2

1. (+) Peter will be taken to the airport by his father tomorrow.
(-)………………………………………………………………….
(?)………………………………………………………………….

Answers

the figure shows cross-section of a ruler which is a rectangle of 2. 5 cm by 0.2 cm on which surmounted an isosceles trapezium (one in which the non- parallel sides area of equal length). the shorter of the parallel sides of the trapezium 0.7 cm long.if the greatest height of the ruler is 0. 4 cm and it is 33 cm long,calculate its surface area

reference of generation of computers?​

Answers

Answer:

First Generation: Vacuum Tubes. Second Generation: Transistors. Third Generation: Integrated Circuits. Fourth Generation: Microprocessors. Fifth Generation: Artificial Intelligence

Write a java program to input a number from the user and tell if that number is a power of 2 or not.
Powers of 2 are 1, 2, 4, 8, 16, 32, 64, 128, 256 and so on.

Answers

Answer:

 public static boolean isPowerOfTwo(int n) {

   long exp = Math.round(Math.log(n) / Math.log(2));

   return Math.pow(2, exp) == n;

 }

Explanation:

The opposite of power-of-2 is the 2-log, which is calculated using any log divided by log(2).

I'm sure you can do the input part yourself!

drawing experiences in high school

Answers

We did the following

Turn Your Markers into Paint.
Stuffed Animal Drawings.
Drawing the Human Form.
Digital Drawing Ideas.
Visual Journaling Ideas.
Line Drawing Lessons.

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019

Answers

The thing that will occur to the files when Sam enables the Data Deduplication Service on Windows Server 2019 is that;

A new copy of Reena's file is formed and linked with the same file name.

What is Data Deduplication?

Data deduplication is known to be a kind of method that is used to remove too much copies of data and it is known to help to lower storage capacity requirements.

This act of Deduplication is known to be one that can be run as an inline process due to the fact that the data is being written into the storage system. When data is done in a background process, it acts to remove other copies after the data has been written to disk.

Learn more about  Data Deduplication from

https://brainly.com/question/24309209

If there are cyber threats and vulnerabilities to your system, what does that expose you to ?


Answers

Answer:

It introduces the possibility of hackers or attackers targeting your system.

I hope this answers your question!

A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?

Answers

Answer:

THEY SHOULD ADD CHEESE!

Explanation:

cheese solves everything,

When installing a processor, what must be placed between the processor and the cooler?

Answers

Answer:

Apply thermal paste to your new CPU Your CPU should now be locked and loaded, but you can’t just put your cooler back on and call it a day.

PLEASE MARK ME AS BRAINLESS!!!!!!!

What type of program would you use to create a personal budget?

Answers

Answer:

using Excel is the easiest way to create and use a budget, based on the formulas you can create to have the budget do the work for you, instead of vice versaExplanation:

What’s a good way to manage a long checklist of items to make sure nothing is forgotten?
A Write the list down three times before working on it.
B Break down larger tasks into smaller, more manageable tasks.
C Divide the list up into categories, and assign each part to individual team members.
D Convert the checklist into a GDD.

Answers

Answer:

C. Divide the list up into categories, and assign each part to individual team members.

Explanation:

Correct me if I'm wrong

Cybercrime
Select 3 options.
is always intentional
O is always unintentional
O can be committed by an outsider
can be committed by an insider
O can be caused by negligence
help me please!?!

Answers

Answer:

O can be committed by an outsider

O can be committed by an insider

O can be caused by negligence

Explanation:

Cybercrime can be done by someone within the company and has access but it can also be done by someone outside through hacking.  Sometime someone broke the law without knowing it because of negligence.

Which of the following is a field whose value uniquely identifies each record in a
table?
Main key
Value key
Primary key
Element key

Answers

A field whose value uniquely identifies each record in a table is called: C. Primary key.

What is DBMS?

DBMS is an acronym for database management system and it can be defined as a collection of software applications that enables computer users to create, store, modify, retrieve and manage data or information in a relational database.

This ultimately implies that, DBMS allow end users to efficiently store, retrieve and manage their data with an appropriate level of security.

In database management system (DBMS), a primary key is a field whose value uniquely identifies each record in a table or relational database.

Read more on primary key here: https://brainly.com/question/8131854

Select all statements that are true of cable internet connections.

A. They're dial-up connections.
B. They're broadband connections.
C. They're wireless connections.
D. They're shared bandwidth connections.

Answers

The statements that are true of cable internet connections are:

They're broadband connections. They're shared bandwidth connections.

What is this connection about?

In telecommunications, cable Internet access is known to be cable Internet and it is said to be a kind of broadband Internet access that make use of the same tools as a cable television.

Note that  the statements that are true of cable internet connections are:

They're broadband connections. They're shared bandwidth connections.

Learn more about internet from

https://brainly.com/question/2780939

#SPJ2

Other Questions
18 lollipops and 36 candy bars whats the ratio of lollipops to candy bars Select the reason that best supports Statement 6 in the given proof. ab + ab = 12 The image produced by an object is 10. 0 cm from a concave mirror that has a focal length of 5. 0 cm. The distance of the object from the mirror, rounded to the nearest whole centimeter, is cm. Is 0.88 greater than 1.5? how do you change 17ten to a base two numeral find the circumference and the area of a circle with diameter of 6 ft use 3.14 help for brainlist bro... TELL ME THE EFFFECts will give branilistHow does the way a society is organized impact the people living in it? The process in which nitrogen circulates and is recycled is called. In the diagram, SOP GNQ. Find the value of x. Electricity traveling through a power line is:A. in alternating currentB. experiencing high resistanceC. passing through insulators at each poleD. unusuable until it is converted to direct current What Does the D in D-Day Stand For?pls help Which is the best statement of the angle-angle similarity theorem?When the preimage of a triangle is a dilation of the image, the triangles are similar.When triangles have two pairs of corresponding angles that are congruent, those triangles are similar.When triangles have two pairs of corresponding angles that are congruent, the third pair of angles is also congruent.When the interior angles of a polygon sum to 180 that polygon is a triangle Read this excerpt from ACT II, Scene 2. Juliet: O Romeo, Romeo! Wherefore art thou Romeo? Deny they father and refuse they name!Or, if thou wilt not, be but sworn my love, And Ill no longer be a Capulet. How do these lines demonstrate Juliets development since ACT I and advance a theme? Is water wet or does it feel wet? Find the Volume of the Cuboid whose Length , Breadth and Height are 25 cm , 20 cm and 15 cm . What are all the ZEROS? Show all the work!(2x+6)(x-4) Your physical movements during training do not need to match those of the sport or activity you want to do.O A. TrueO B. False I need help pleasee!!! The first pic is the questions and the second pic is what your answering the questions about. Its 2 easy q'S. Why Saudi Arabia is an unlikely ally of the USA?