3. Which of the following strategies will lower the conduction load in a building? (choose all that apply)
A. Lowering the U-factor
B. Raising the U-factor
C. Lowering the A in square feet
D. Raising the A in square feet
E. Lowering the AT
F. Raising the AT

Answers

Answer 1

Explanation:

Site the building carefully. ...

Use trees and other vegetation to shade the house. ...

Minimize size of windows on east and west; limit size on south. ...

Use low-solar-transmittance glazings to reduce solar gain. ...

Shade windows with architectural features.


Related Questions

Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.
software engineering process
B.
software quality metrics
C.
SQA audits
D.
reviews

Answers

Answer:

B: software quality metrics .

In your program, your ball dropped. What condition made the ball stop when it reached the origin of the axes you had drawn?

Answers

The condition that made the ball stop when it reached the origin of the axes you had drawn is the gravitational force that is of the interaction between two objects with mass.

What is the force that act on an object when you drop a ball?

The gravitational force is known to be a kind of interaction that exist between two objects with their mass.

Note that for a falling ball, the two objects with their known mass are said to be the Earth and also the ball. The power of this gravitational force is said to be proportional to the product of the two said masses.

Learn more about gravitational force from

https://brainly.com/question/72250

Answer:  while ball.pos.y > 0

Explanation: This is the aswer if you are looking fo the equation.

explain the importance of computer graphics?​

Answers

Answer:

Computer graphics are similar to the visual designs and textures we see in pc games and such everyday we use our computers. Just basically re-creatable images and re-creating images into art.

Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information to be kept secret.

a. True
b. False

Answers

Answer:

true

Explanation:

the answer is true dude

Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such an impact?

Answers

Spreadsheets is known to be an credited tool with legitimizing the personal computer as a business tool. Spreadsheets have a lot of impact in business world because:

It has low technical requirement. Here, spreadsheet does not need a complex installation and it is easy to understand.Data Sifting and Cleanup is very easy to do.It is a quick way to Generate Reports and Charts for business.

What is Spreadsheets?

Spreadsheets is known to be a key  business and accounting tool. They are known to have different complexity and are used for a lot of reasons.

The primary aim of this is that it helps us  to organize and categorize data into a kind of logical format and thus helps us to grow our business.

Learn more about Spreadsheets from

https://brainly.com/question/4965119

Write a 2 page paper explaining why a compiler needs to know about both the target architecture as well as the target OS.

Answers

The target architecture and the operating system are important to the compiler to perform high level executions which are made in programming language.

What is a compiler?

A compiler simply means a computer program that is important in the translation of codes that are written in a particular language to another programming language.

In this case, they're vital to perform high level executions which are made in programming language.

The target architecture also sets the framework for the planning and assigning of resources to reach a desired state.

Learn more about compiler on:

https://brainly.com/question/26175597


Why is it pointless to expect cyberattackers to follow organizational legal measures?

A. because they do not abide by business rules and regulations

В. because they are obligated to the laws of the land

c. because cyberattackers are not legally held to the same standards as the common user

D because cyberattackers only exist virtually and therefore cannot ever be caught

Edmentum

Answers

Answer:

The answer is A.

A software repository, also known as a 'repo'

Answers

A software repository is a storage location for software packages. Often a table of contents is also stored, along with metadata. A software repository is typically managed by source control or repository managers.

I hope this helps

why are laptops more expensive than desktop with same features and power

Answers

It has the added feature of being portable but mostly laptop under perform desktops

how you are going to use the online platforms responsibly as a source of information you may cite an example on how will you comply to existing laws on use the online platforms​

Answers

Answer:

1. Don't post or say anything bad.

2. Stay away from the dark internet.

3. Don't hack people.

4. Be safe!

13. You're emailing your grandparents. Which of the following is the best example of digital etiquette?
A. Typing in all caps because they wear glasses
B. Repeatedly teasing them in an attempt at humor
C. Pirating movies that they want to see
D. Spelling out words and avoiding slang

Answers

d. spelling out words and avoiding slang

Answer:

D

Explanation:

spelling out words and avoiding slang

Different between barcode reader an biometrics device

Answers

Answer:

See below

Explanation:

Overall, scanning a barcode with a barcode reader simply tells you that it can be scanned by that particular reader and does not guarantee quality. While barcode readers are used to read codes, barcode verifiers are used to grade the quality of codes

5. Height, weight, time, and distance are examples of what?

Answers

Answer:

They're examples of: Measurement of time.

Explanation:

distance or weight are examples of variable the varribles too

:) Hope this helps Let me know If I need to revise

height, weight, time, and distance are all examples of measurements.

I won't to convert text to a table . what is the first step I should take ?

Answers

Answer:

Use paragraph marks to indicate where you want to begin a new table row. Select the text that you want to convert, and then click Insert > Table > Convert Text to Table. In the Convert Text to Table box, choose the options you want.

Explanation:

please put me in brainlest

Write the syntax of GOTO, ON GOTO and IF THEN ELSE with examples.​

Answers

Answer:

GOTO:

goto label;

... .. ...

... .. ...

label:

statement;

Example:

/ Program to calculate the sum and average of positive numbers

// If the user enters a negative number, the sum and average are displayed.

#include <stdio.h>

int main() {

  const int maxInput = 100;

  int i;

  double number, average, sum = 0.0;

  for (i = 1; i <= maxInput; ++i) {

     printf("%d. Enter a number: ", i);

     scanf("%lf", &number);

     

     // go to jump if the user enters a negative number

     if (number < 0.0) {

        goto jump;

     }

     sum += number;

  }

jump:

  average = sum / (i - 1);

  printf("Sum = %.2f\n", sum);

  printf("Average = %.2f", average);

  return 0;

}

Write pseudo code that performs the following: Ask a user to enter a number. If the

number is between 0 and 10, write the word blue. If the number is between 10 and

20, write the word red. if the number is between 20 and 30, write the word green.

If it is any other number, write that it is not a correct color option.​

Answers

Answer:
BEGIN
INPUT N
IF N>0 AND N<10 THEN
OUTPUT "blue"
ELSE
IF N>10 AND N<20 THEN
OUTPUT "red"
ELSE
IF N>20 AND N<30 THEN
OUTPUT "green"
ELSE
OUTPUT "It is not a correct color option"
ENDIF
END.

Explanation:

Ask a user to enter a number. If the number is between 0 and 10, write the word blue. If the number is between 10 and 20, write the word red. if the number is between 20 and 30, write the word green. If it is any other number, write that it is not the correct color option

pseudo-code is:

Write "Please enter a number"

Read colornum

If(colornum >0 and colornum <= 10)

Write blue

else If(colornum >10 and colornum <= 20)

Write red

else If(colornum >20 and colornum <= 30)

Write green

else

Write "not a correct color option"

What is pseudo code?Pseudocode is also called false code. Pseudocode is a natural way of programming description that does not require any strict programming language syntax or underlying technology considerations. In simple words, the pseudocode is the planning or designing program.  

To learn more about Pseudocode refer to:

https://brainly.com/question/24953880

#SPJ2

What purpose does encryption on the internet serve? Why is it so important?

Answers

Answer:

it keeps cybercriminals from stealing private information

Explanation:

hope this helps

Which of these best describes the principle of least privilege? Users should have at least the privileges they need to do their jobs, and usually more. Users should have at least the privileges they need to do their jobs, and usually more. Only one system administrator should have the highest level of privileges. Only one system administrator should have the highest level of privileges. The fewer privileges users have, the better a network operates. The fewer privileges users have, the better a network operates. Users should have the minimum privileges needed to do their work. Users should have the minimum privileges needed to do their work.

Answers

The statement which best describes the principle of least privilege is: D. Users should have the minimum privileges needed to do their work.

What is principle of least privilege?

Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the least (minimum) levels of access and permissions necessary to perform  a work or an action in a database.

In this context, end users should have the least (minimum) privileges needed to do their work, in order to protect a database or network.

Read more on least privilege here: brainly.com/question/4365850

Answer:

Users should have the minimum privileges needed to do their work.

Explanation:

Ed22

whats your favourite dramas , suggest me some ...........​

Answers

Grownish, vampire diaries, inventing Anna

What is the function of network security
It protects information from users.
It protects networks from intruders,
It secures networks from users,
It protects users from networks,

Answers

It protects users from networks

and other data from breaches intrusion and other threats.

Answer:

it protects netorks from intruders

Explanation:

i took the test

What are the different selection structures in the C programming language?

Answers

Answer:

SELECTION STRUCTURES

Selection statements allow you to control the flow of program execution on the basis of the outcome of an expression.

different selection structures are:

1)if statements

2)if-else statements

3)if-else-if statements

4)switch statements

Explanation:

THE IF STATEMENTS

the first statement in the if block is only executed when the specified condition is true.If the condition is false then the contained statement will be skipped and execution continued with the rest of the program.

example:

public class IfDemo

{

public static void main(String[] args) {

int age;

Scanner inputDevice = new Scanner(System.in);

System.out.print("Please enter Age: ");

age = inputDevice.nextInt();

if(age > 18)

System.out.println("above 18 ");

}

}

THE IF-ELSE STATEMENTS

if the specified condition in the if statement is false, then the statement after else will be executed.

example:

public class IfElseDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

if ( age >= 18 )

System.out.println( "above 18 " );

else

System.out.println( "below 18" );

}

}

THE IF-ELSE-IF STATEMENTS

the statements after else can be another if or if-else statement, multiple if-else statements.When the condition is true, the associated statement will be executed and remaining conditions will be bypassed.

example:

public class IfElseIfDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

if ( age >= 18 && age <=35 )

System.out.println( "between 18-35 " );

else if(age >35 && age <=60)

System.out.println("between 36-60");

else

System.out.println( "not matched" );

}

}

THE SWITCH STATEMENTS

It is a multi way branch statement. It defines multiple paths of execution of a program.It provides a better alternative than if-else-if statements.

example:

public class SwitchDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

switch ( age )

{

case 18:

System.out.println( "age 18" );

break;

case 19:

System.out.println( "age 19" );

break;

default:

System.out.println( "not matched" );

break;

}

}

}

The different types of selection structures in the C programming language are:

1) if statements2) if-else statements3) if-else-if statements4) switch statements

What is C programming language?

The sequence statement, selection statements (of which there are three variants: if, if...else, and switch), and repetition statements are the only three forms of control structures available in C++.

Due to the fact that C is compiled, it is a quicker language than Python. Since Python programs are interpreted, they typically run more slowly than C applications. When a variable is created in C, its type must be defined, and only values of that specific type are allowed to be given to it.

Therefore, the different selections of C programming languages are

1) if statements2) if-else statements3) if-else-if statements4) switch statements

To learn more about C programming language, refer to the link:

https://brainly.com/question/10937743

#SPJ2

What is the term given to large values of information collected from various sources?

A.
association
B.
classification
C.
neural networks
D.
big data

Answers

The term given to large values of information collected from various sources ; association.

What is the various?

The various can refer to a range of different things, depending on context. It could refer to different types of people, cultures, items, or anything else that can be seen as different or distinct from each other. It could also refer to different ways of looking at or doing something. For example, various methods of problem solving, various approaches to studying, various strategies for communication, etc. Ultimately, the various refers to the different options that exist in a given situation.

To learn more about various

https://brainly.com/question/26986135

#SPJ1

_________security may also be referred to as Information Technology security.

Answers

Answer:

Computer Security or Cybersecurity

Explanation:

Information Technology Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data.

Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?

Answer: I will choose a good study area. Then, I will use highlighting, notes, flash cards, and checklists to study for the tests.

Answers

Answer:

I will also choose a good study area and copy them and paste it

Answer:

Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?

Explanation:

i did it


1. Welds made critical piping must be expertly
Completed, thoroughly inspected, and

Answers

Welds made on critical piping must be expertly​ completed, thoroughly​ inspected, and​ also at least as strong as the piping being welded.

What welding process is used on pipelines?

Welding processes are known to be the method that is used in a range of industries such as aerospace, automotive, energy, construction etc.

Pipe welding is known to be one that uses arc welding techniques, such as shielded metal arc welding (SMAW), gas metal arc welding (GMAW) and others. note that Welds that is done on critical piping have to be expertly​ completed, thoroughly​ inspected, and​ also at least as strong as the piping being welded.

Learn more about Welds from

https://brainly.com/question/5794222

what is communication​

Answers

Answer:

The transmission of information between two things?

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n’s, if the number of times the character appears is not eactly 1.
Ex if the input is: n Monday
the output is: 1 n
Ex: if the input is: z Today is Monday
The output is 0 z’s
Ex: if the input is: n It’s a Sunday day
the output is: 2 n’s
case matters
Ex: if the input is: n Nobody
the output is: 0 n’s
N is different than N.


I need help putting it in Java

Answers

Answer:

class Main {

 public static void analyzeString(char c, String s) {

   int count = 0;

   for(int i=0; i<s.length(); i++) {

     if (s.charAt(i) == c) {

       count++;

     }

   }

   

   System.out.printf("%c %s\n", c, s);

   System.out.printf("%d %c%s\n\n",count, c, count==1 ? "":"'s");

 }

 

 public static void main(String[] args) {

   analyzeString('n', "Monday");

   analyzeString('z', "Today is Monday");

   analyzeString('n', "It’s a Sunday day");

   analyzeString('n', "Nobody");

 }

}

Explanation:

I did not add code to prompt the user for input, but rather added the test cases as you provided.

By the way, there is only one 'n' in 'It's a Sunday day'. So the example is wrong there.

a researcher saved her draft work on a CD ROM from a friends computer with an intention of sending it to her supervisor by e-mail once she got home. however on reaching home she realized that her computer could not read a CD ROM. how can you advice her to have her work sent without physically going back to her friend?

Answers

Answer:

mail the cd to the supervisor

Explanation:

What does a good SOW include?

a mission statement with summarized sections.
a mission statement with detailed sections
a broad statement with summarized sections
a broad statement with detailed sections

Answers

Answer:

a broad statement with summarized sections

Explanation:

A.Direction: identify the following examples of the ingredients used for sandwiches.

Answers

Answer:

i dont know how to answer may module because i dont have helper

Other Questions
what is polyatomic?.. 1. Hypothesize An aquarium hobbyist wants to breed guppies with large, fan-shaped,red tails. The hobbyist has a large number of guppies with assorted tail colors andshapes in an aquarium. Write a hypothesis that explains how the hobbyist shouldproceed to breed a population of guppies with the desired traits. Freeze Ice Cream Shop sells its specialty shakes for $3.50 each. In the summer months, the shop typically sells 200 shakes a day. The shop's owner thinks if he reduces the price to $3 he will increase sales significantly. However, when he reduced the price, he only sold about 15 more shakes per day. This represents demand that is :___________ How is DDT spraying for malaria different from spraying for agriculture? Fill in the blanks. Fill in the blanks with the correct words to complete the sentences. Choose your answer from the box. Social context Context Public Relations Communication Journalist Channel 1. Communication is a manner of passing information between people or group for common understanding and confidence. 2. A good will collect facts, research and investigate the subject matter based on a unique style, and formulate language that tells a story. 3. People of the same background with shared culture, understanding information needs called 4. is a strategic communication process that builds strong mutual understanding between and among people in any organization. 5. It is the atmosphere, climate that exists when people communicate with each other. Not necessary to say, can easily make or break the effectiveness of communication. MODIFIED TRUE or FALSE. Write TRE if the statement in EXPLAIN THIS POSTER BY DISCUSSINGABOUT THE DISEASE, CAUSES, SIGNS AND SYMPTOMS, AND WHAT POSSIBLE MEANS TO AVOID SUCH A DESEASE. A function is a relation where each input value is assigned to_____one output valueA. exactlyB. less thanC. at least What fractions are greater than 7/12 help me pleaseeeeeeeeee QUICK ASAPCreate an original plan that an engineer would follow to develop a device that will allow domestic animals to have prosthetic limbs that are reasonably priced and effective in use. Imagine you are writing a history of your own culture and times. Identify some aspects of your own culture that could be described both favorably and unfavorably. simplify (6x^2-7x-5)/(3-x) DONT SCAM ME+BRAINLISTA pea plant has purple flowers. It has a genotype PP. Which of the following about the gene of flower color in the pea plant is true? The pea plant has only recessive alleles for the gene. The pea plant received the same allele from each parent. The pea plant received different alleles from both parents. The pea plant has both recessive and dominant alleles for the gene. Which punctuation is correct?If, we watch that I'll fall asleep.If we watch that I'll fall asleep.If we watch that, I'll fall asleep.If we watch that. I'll fall asleep. I'm about to finish 6th grade and I found out that most of the topics we studied and we are still studying are a bit difficult in math, so what topics I must need to know so I get prepared for 7th grade, would you help me please?I will appreciate it so much. Privately owned media companies in the united states earn most of their revenue from:. Pls help I need this for monday please help me on answer The rectangle below has an area of x2 25 square meters and a length of x + 5 meters.What expression represents the width of the rectangle? Prepare a frequency distribution for the data set.Data set C: The heights (rounded to the nearest inch) of 30 students are given.