As a chemical engineer, what would you be most likely to do in your job?
design robots to perform repetitive tasks
sterilize food processing equipment
design sewer treatment plants
combine microorganisms and enzymes to create new medicines

Answers

Answer 1

Answer:

The correct option is;

Design sewer treatment plants

Explanation:

Chemical engineers, also known as a process engineer, are involved in the design and development of cost beneficial ways of utilizing energy and materials which can mostly be established as a chemical manufacturing process

The chemical engineer works by applying scientific principles to resolve and provide amicable solutions to the production usage, disposal, and waste management, of chemical and other related materials

Chemical engineers conducts research into the usage of materials and production process.


Related Questions

Design a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as: 247 + 129 The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be

Answers

Answer:

import random

num1 = random.randint(0, 1000)

num2 = random.randint(0, 1000)

print(str(num1) + " + " + str(num2) + " = ?")

result = int(input("Enter the answer: "))

if result == (num1 + num2):

   print("Congratulations!")

else:

   print("The correct answer is: " + str(num1 + num2))

Explanation:

*The code is in Python.

Import the random to be able to generate random numbers

Generate two numbers, num1 and num2, between 0 and 1000

Ask the sum of the num1 and num2

Get the input from the user

If the answer is correct, display a message of congratulations. Otherwise, display the correct answer

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On 29 September, Operation Panda will commence. What concept is used to derivatively classify the statement in the new document?

Answers

Answer:

The answer is "Contained in"

Explanation:

Its term refers to the classified information of the extraction process, even though outlined in an authorized categorization instruction origin without extra explanation or review, and incorporates these data in a new document.

In this concept, the information appears in the extracted word-for-word, its definition of 'in' will apply, or if its data has been paraphrased or restated from the current text, that's why we can say that this concept derivatively classifies the statement in new documents.

Here is the first line of a method declaration with some parts missing. public ________ scoreAnswer (studentAnswer ) Fill in the blanks in the method declaration using the following information: If scoreAnswer returns nothing and studentAnswer is a Paragraph object.

Answers

Answer:

void

Explanation:

The code snippet illustrates an object oriented programming (OOP)

From the question, the method name is scoreAnswer and it is not expected to return anything.

In OOP, when a method is expected to return nothing, the method is declared as void.

So, the blank will be replaced with the keyword void and the full statement is

public void scoreAnswer(studentAnswer)

Different bosses have the authority to run their own departments in what department?

Answers

Answer:

Decentralized organization

Explanation:

A decentralized organization is an organization that decisions about the operation of the organizations units are made by the mid-level managers or lower-level managers as the case may be, instead from being made directly from the senior management or the company head

Fast-food franchise chain management is an example of a decentralized organization such that each outlet manages the planning income and expenditure of the unit business.

Decentralization is can be beneficial as it can lead to outstandingly broad creativity as demonstrated in  Google,which is  another good example of a decentralized structure of organizational management.

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

Which step is common to both creating a new document and saving a document?

clicking the File tab
clicking the New tab
clicking the Save As tab
clicking the Blank document icon

Answers

Answer: clicking the File tab

Explanation: The file tab refers to a multifunctional tab in most Microsoft products such as Microsoft Word, Microsoft Excel and so on. The tab is located on the ribbon and usually the first located on the upper left corner. The tab houses the file functions. Clicking on the file tab, users can create a new document by clicking the File tab, click new, then click bank document to create a new document. Also, to save a file either using the 'save' or 'save as' command, just locate the file tab, click on it and select either the save or save as option. The save as function allows users to save a copy of a document without making changes to the already saved copy.

Answer:

clicking the File tab

Explanation:

I just took it

In 25 words or fewer, describe what Jaime could do at the guitar store to help customers satisfy their needs and wants.

Answers

Answer:

Jaime could allow the use of the guitars that are for sale within the store.

Explanation:

One of the biggest problems with these musical instrument stores is that you are not allowed to play the instruments unless you are going to buy them.

A store that allows the practice of these instruments within the establishment ensures that the customer tried to play the instrument, liked it, and decided to buy it.

It is a way to satisfy the customer.

Answer:

He could ask customers if they need help finding what they want. He can let his manager know if any product is running low.

Explanation:

legit the answer lol

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.

Answers

Answer:

A. A dotted arrow from the class to the interface terminated with a triangular tip

Explanation:

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this

Answers

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens

Answers

Answer is given below

Explanation:

when performing in computer and we have two files on the computer first one is string and another one is the music list                 so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music book              

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^​

Answers

Answer:

if you dont you wont be able to do school work or check your email

Explanation

Answer:

security because it very important when we use internet

What does the statement mean “To take a photograph is to participate in another’s person’s mortality, vulnerability, and mutability?

Answers

Answer:

probuly to take a photograph of ur childhood

Explanation:

idk

Answer:

To take photograph is to participate in another’s person’s mortality, vulnerability, and mutability. That means when you take a picture of someone you are participating in their lives, it may be just a small fragment of that life, but it still is a life.

Explanation:

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:

Answers

Answer:

Here is the Python program:

def format_name(first_name, last_name):  #function definition of format_name that takes first_name and last_name as parameters

   if first_name != '' and last_name != '':  #checks if first_name and last_name both are not equal to " "

       return ("Name: " + last_name + ", " + first_name)  #returns first name and last_name in format: "Name: last_name, first_name"

   elif first_name != '' or last_name != '':  #checks if either of the first_name or last_name is not equal to " "

       return ("Name: " + last_name + first_name)  #returns first name and last_name in format: "Name: last_name" or "Name: first_name"

   else:  #if both names are blank

       return ''  #return ""

 

Explanation:

The working of the above function can be checked by using the following statements:

print(format_name("Ernest", "Hemingway"))  

print(format_name("Voltaire", ""))  

print(format_name("", "Madonna"))  

print(format_name("", ""))

The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.

The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + ", " + first_name)

This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:

Name: Hemingway, Ernest    

The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + first_name)  

This returns the last_name string. For the above example the string is printed in the following format:

Name: Voltaire          

IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned

return ''  

This will just print and blank space in output.

The program and its output is attached.            

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

Which statement is true about teams?

Answers

Answer:

Which is true of jet streams

A The subtropical jet stream flows to the east while the polar jet stream flows to the west

B The subtropical jet stream lies between the westerlies and polar easterlies

C The polar jet stream is generally stronger than the subtropical jet stream

D The polar jet stream lies between the polar easterlies and trade winds

The subtropical jet stream lies between the westerlies and trade winds.

Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.

Explanation:

A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.

The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.

Learn more about the true about teams.

brainly.com/question/12078417.

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?

Answers

Answer:

Yes

Explanation:

A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed

A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources

Section 1.4 of Executive Order 13526 lists categories of information eligible for classification

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.A. TrueB. False

Answers

A true because for an example do you have a computer and you want and you got a new one and you just want to put everything that was on the computer on it you can just switch the data and then automatically it will go on the other computer.
hope this helps

What are the parts to an
email?

A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above

Answers

Answer:

B) recipient subject body signature

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability

Answers

Answer:

the hybrids will be better

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

Could Anyone help me with these two questions?

Answers

Answer:1st is b

2nd is d

Explanation:

Other Questions
What are the possible steps involved in solving the equation shown? Select three options. 3.5 + 1.2(6.3 7x) = 9.38 Add 3.5 and 1.2. Distribute 1.2 to 6.3 and 7x . Combine 6.3 and 7x . Combine 3.5 and 7.56. Subtract 11.06 from both sides. Mark this and return Save and Exit Next Submit How did WWI come to an end? Ruben goes to a shop to buy 24.5m of cloth and 13.5m ribbon. The cloth costs Rs.85.40 per metre and the ribbon costs Rs.8.5 per metre. If he pays Rs. 2300 to the shopkeeper, how much money will he get back? Write a thesis statement using enjoying really bad movies please help me. I been stuck on this question for a long time :( Interior angles are located on the a. Inside b. Outside of a polygon. Exterior angles are located on the a. Inside b. Outside of a polygon. HELP ASAP WILL ,ARK BRAINLIEST!!! Does the study of geography only have to do with knowing the physical features of the earth and the atmosphere? Why or why not? Find the equation of the line passing through the pair points (-8,6) (-9,-9). The equation of the line in the form is Ax+By=C. The production sector would NOT include Group of answer choices a Florida orange grove a California wine grower a meat packing plant For the current year ended March 31, Cosgrove Company expects fixed costs of $27,600,000, a unit variable cost of $805, and a unit selling price of $1,150.a. Compute the anticipated break-even sales (units).unitsb. Compute the sales (units) required to realize operating income of $5,175,000.units Which ratios measure the extent of a firms financing with debt relative to equity and its ability to cover interest and fixed charges? ametal of mass 0.6kg is heated by an electric heater connected to 15v batter when the ammeter reading is 3A its tempeeature rises feom 20c to 85c in 10 minutes calculate the s.h.c of metal cylinder Find all the solutions to \[\frac{x+4}{x+5} = \frac{x-5}{2x}.\][tex]Find all the solutions to\[\frac{x+4}{x+5} = \frac{x-5}{2x}.\][/tex] The American Revolution wasA-War of Independence fought between France and the American colonists in anattempt to break free from oppressive ruleB - was fought between the American colonists and Great Britain in an attempt to breakfree from oppressive ruleC - is an event that does not really have any impact on our livesD - none of the above A company is considering replacing an old piece of machinery, which cost $400,000 and has $175,000 of accumulated depreciation to date, with a new machine that has a purchase price of $550,000. The old machine could be sold for $250,000. The annual variable production costs associated with the old machine are estimated to be $72,500 per year for eight years. The annual variable production costs for the new machine are estimated to be $24,000 per year for eight years.Required:a. Prepare a differential analysis dated May 29 to determine whether to continue with (Alternative 1) or replace (Alternative 2) the old machine. b. What is the sunk cost in this situation? De qu manera saber el tiempo de persistencia del virus en distintas superficies es til para los cientficos Yiadom is yyears now. What would behis age in the next tenyears. Write a Poem and a ResponseWrite a poem that has a similar theme to the poem that you chose as your favorite andjust wrote about. The poem can be any length.After you finish your poem, write a response of one or two paragraphs that explainsyour poem. In your response, answer the following: What is the theme of the poem you wrote? Which line(s) in your poem best capture or convey its theme? How do your poem and its theme reflect the theme of the poem you chose in theprevious section?Use the Poetry and Response Rubric found in the essential documents to help youevaluate your poem and response.Submit your assignment when complete. Suppose that a country has no public debt in year 1 but experiences a budget deficit of billion in year 2, a budget surplus of billion in year 3, a budget surplus of billion in year 4, and a budget deficit of billion in year 5.A) What is the absolute size of its public debt in year 4? B) If its real GDP in year 4 is $104 billion, what is this country's public debt as a percentage of real GDP in year 4? has a major medical insurance policy with a $500 calendar-year deductible, a $5,000 out-of-pocket limit, and 80-20 coinsurance. was hospitalized for a surgical procedure in March, his first healthcare treatment during the year. The total bill was $20,000. Considering the deductible and coinsurance, how much of this amount must pay