Beth instructed her workers to use a particular material in building a house. This material decayed due to bacteria and insects. Which material did she tell her workers to use?A.
brick
B.
concrete
C.
wood
D.
steel

Answers

Answer 1
Answer: The answer: Option C
Answer 2
Answer:

Answer:

Wood

Explanation:


Related Questions

How will a decrease in technology from a natural disaster such as a hurricane, ceteris paribus, affect an economy's production possibilities curve?
You are creating a document for your students at school using Words 2013. You are concerned that some of your students have older versions of word. How can you ensure that your students can open up these word files in older versions of word?
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core - an operation called:A. graphics coprocessingB. multiplexer processingC. arithmetic-logic processingD. parallel processing
An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicles, is called a
The file manager used in Microsoft Windows is

Instructions: Type the correct answer in the box. Spell the word correctly.What would be the address of the cell, which is intersection of the second row and the third column in a worksheet?

_____________ is the address of the cell formed by the intersection of the second row and third column in a worksheet.


P.S this is about cell documents

Answers

Answer:

B3

Explanation:

In Microsoft Excel the vertical line of spaces is a column. The horizontal line of spaces is a row. At the intersection there is a cell. This is where a numerical value is typically entered or just a calculated result reported.


A cell in excel is the intersection of a row and column.
The rows are numbered while the columns are lettered.
So row 2 column 3

Therefore, the cell address is C2.

A(n) ____ is an attack that takes advantage of a system vulnerability.

Answers

Exploit - An attack that takes advantage of a system vulnerability, often due to a combination of one or more improperly configured services.

Having a positive work ethic means acceptingconstructive criticism even though it may be
painful. You should: (select all that apply)
show a positive facial expression.
maintain eye contact
not interrupt or speak until you are sure the
other person is finished making a point
question the person frequently throughout the
conversation

Answers

Answer:

123 and the next one is all of them

Explanation:

Answer:

2 and 3 (1 is debatable)

Explanation:

What is the term for a website that uses encryption techniques to protect its data?

Answers

The term for a website that uses encryption techniques to protect its data would be secure site. It is a facility with servers that are secued and prevent the exchange of data  or financial transactions over unauthorized networks. Hope this answers the question.

Click on this link toOpens a New Window. bring up a flowchart in a new browser window. Based on this flowchart, would a D-Link 3347 Gateway with an Xbox 360 Multiplayer problem be In Scope or Out Of Scope

Answers

Answer:

The correct question is as follows:

" Click on this link to bring up a flowchart in a new browser window. Based on this flowchart, would a D-Link 3347 Gateway with an Xbox 360 Multiplayer problem be In Scope or Out Of Scope ( see quiz 2 flowchart)". The answer is OUT OF SCOPE.

Explanation:

The flowchart as seen in the attached file shows that for a network related issue, a D-Link Gateway with an Xbox 360 Multiplayer problem would be out of scope. The flowchart clearly indicated that after confirming from the customer if the networking device is a router or gateway, then the next step is to confirm if it is a D-LINK gateway then what type of D-Link in order to confirm if it is 3347 Gateway. After it is confirmed that it is the type 3347 Gateway then we need to confirm from the customer if the it is connected to another smc router and what the issue may be, i.e if it is port forwarding-related or not. Then, we confirm if it is xbox 360 and if the problem is multi-layer game issue, and if this is correct then the issue is regarded as Out of Scope.

See the attachment again for clearer picture of the explanation in the flowchart.

Current cannot exist withouta. voltage.
b. resistance.
c. an open circuit.
d. all of these

Answers

The answer is A. Voltage,
resistance would cause less current to go through, and and an open circuit would cause nothing to go through