Maryann is looking for the tolerances of the widget she is producing. what document should she reference

Answers

Answer 1

To find the tolerances of the widget she is producing, Maryann should reference the engineering drawings or specifications for the widget.

Engineering drawings typically include detailed information about the dimensions, materials, and tolerances required for the production of a part or component. These drawings may be created by an engineer or designer using computer-aided design (CAD) software, and they are often used as a blueprint or guide for manufacturing and quality control purposes.

In addition to the engineering drawings, specifications documents may also provide information about the tolerances required for a particular widget. These documents may be created by the manufacturer or customer, and they typically include information about the desired performance, quality, and characteristics of the widget.

When referencing the engineering drawings or specifications for a widget, it is important for Maryann to ensure that she is using the correct version of the document, as any changes or updates may affect the tolerances or other requirements for the part. Additionally, she should make sure that she understands the terminology and units of measurement used in the document, as these may vary depending on the industry or application.

To learn more about Designing, visit:

https://brainly.com/question/20038773

#SPJ11


Related Questions

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house

What are elements ?Give any five example​

Answers


Chemical element, also called element, any substance that cannot be decomposed into simpler substances by ordinary chemical processes. Some examples are carbon, oxygen, hydrogen, gold, silver and iron.

Technical environment refers to all the technological surroundings that influence organization. Technology consists of skills,methods,systems and equipment. It includes and innovations. It makes work more efficient. It is a means to transfer input into outputs.

Technology influences organizations by bringing about changes in jobs, skills, lifestyles, production methods and processes. Automation, computerization, robotics, informatics, biotechnology, laser, new materials and artificial intelligence have all influenced organizations.Information technology affects every function of within the organization.Organizations should be aware of technological changes tot avoid obsolescence and promote innovation.

Technological forecasting is also important.Technology reaches people through organization. It is a powerful force that shapes their destiny.

1)Level of technology: The level of technology can be appropriate or sophisticated. It can be labour-based or capital-based.The level of technology influence organizations.

Labour based technology: Human labour is mainly used for operations.

Capital based technology: Machinery is mainly used for operations. Technology is represented by automation, computerization, robotizing, etc.

2)Pace of technological change: Technology is a dynamic force. Its speed of change is accelerating. Invention, innovation and diffusion increase its pace. Organizations should adapt to changing technological forces. They should also upgrade the skills of their human resources to effectively cope with the demands of technological changes.

Technological change influences organizations in the following :

It can make existing industries obsolete.It can the rates of obsolescence.

It can rejuvenate the existing industries through product improvements or cost reductions.

It can create entirely new industries.

It can increase government regulations.

3)Technological transfer: Sources of technology can be within the organization, within the country or foreign countries. Technology transfer implies technology import for organizations.

Technological transfer implies technology imported from technologically advanced foreign countries. Its speed is important for organizations.

Globalization: Global companies are the key sources of technology transfer in developing nations.

Projects: Turnkey projects based on global bidding serve as a source of technology transfer.

Trade: This consists of the sale of equipment or machines by the manufacturer.

Technical assistance: Bilateral and multilateral donors under technical assistance provide international consultants who bring new technology with them.

Training and publication: They provide opportunities to about new technology.

Technological transfer influences organization by :

Increasing and decreasing costs.

New product development and product improvement.

Improving production systems and processes.

Better satisfaction of customer needs.

4)Research and development: R&D is the essence of innovation. The Expectation for improvement is increasing. Customers expect new products of superior quality which are safe, comfortable and environment friendly. This calls for increase research and development budget by organizations. Government and industry collaboration and spending in R&d efforts is also an important aspect of the technology environment.

I hope this helped!

Write a function that takes a 2D array and first sorts the elements in each row and then sorts the rows by the first element.


Sample run:

mat = [[9, 7, 7, 0], [3, 3, 9, 8], [8, 5, 2, 9], [9, 10, 10, 9], [6, 5, 7, 4]]

my_sort(mat)

print(mat)

Prints the following:

[[0, 7, 7, 9], [2, 5, 8, 9], [3, 3, 8, 9], [4, 5, 6, 7], [9, 9, 10, 10]]

Answers

Answer:

def my_sort(m):

 for a in m:

   a.sort()

 m.sort(key=lambda a: a[0])

Explanation:

The lambda tells the sort function to use the first element of the array.

Question 2 of 10
A potential danger of social media is that:
O A. people make friends that live across the world.
B. your information can be viewed by strangers.
C. users can easily join an interest group online.
D. job applications can be downloaded online.

Answers

Explanation:

B. This is because everyone we don’t know is good and bad can know all of our biodata

Who plans,codes, and creates webpages

Answers

Answer:

it is the job of a web designer

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

Can anyone please help me with how to use a while loop to ask a user to input positive integers until the user enters 0 and at the
end, print the largest number of all the integers entered.

I can send an example if needed

Answers

In python 3:

def main():

   largest = 0

   while True:

       number = int(input("Enter a number: "))

       if number == 0:

           print(largest)

           return

       elif number > largest:

           largest = number

if __name__ == "__main__":

   main()

I hope this helps!

What is the name of the character set created to allow
computers to represent other languages?​

Answers

Answer:

UTF-8, which stands for Unicode Transformation Format – 8-bit.

Answer: ASCII

Explanation:

The ASCII character set is a 7-bit set of codes that allows 128 different characters.

If you found my answer useful then please mark me brainliest.

Which section, or hive, in the Windows Registry stores information about drag-and-drop rules, program shortcuts, the user interface, and related items?

Answers

Answer:

The correct answer will be "HKEY_CLASSES_ROOT (HKCR) ".

Explanation:

The Windows Registry seems to be an environment inside the operating system applications of Microsoft Windows that holds certain details as to whether machine memory becomes configured up, which applications are to be launched whenever the operating process becomes booted, which hardware is connected and the device solutions were selected.This HKCR is indeed a Windows Registry registration system hive but instead incorporates organization file extension additional data, and also some data from a conceptual identification number, class ID, but mostly connectivity ID. It  includes references again for correct file identifier as well as COM class contact information including such IIDs.

I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.

Answers

Answer:

oh- Did he find out-

Explanation:

Challenge 1
Create a flowchart that takes two integer values from a user and evaluates and displays which one is the smallest value.

Challenge 2
Create a flowchart that asks the user to guess a random number populated by the program between 1 and 100. Use a logic flow arrow to create a loop that returns the user back into the program to continue guessing.

Challenge 3
Create a flowchart that asks the user for a number 10 separate times and adds all the numbers together. At the end, have the program display the sum.

Answers

Using the knowledge in computational language in python it is possible to write a code that create a flowchart that asks the user to guess a random number populated by the program between 1 and 100

Writting the code:

import random

def main():

randomNumber = random.randint(0,100)

count =0

while True:

guess = input("Guess?")

if(guess == randomNumber):

count = count+1

print "Congratulations found guessed correct number and number of guesses are ",count

break

elif guess >100 or guess <0:

print "Input should be in between 0 and 100"

elif guess > randomNumber:

count = count+1

print "Too high, try again."

elif guess < randomNumber:

count = count+1

print "Too low, try again."

if __name__=='__main__':

main()

See more about python at brainly.com/question/16757242

#SPJ1

Challenge 1Create a flowchart that takes two integer values from a user and evaluates and displays which

Please give me podcast ideas. For school I have to make a podcast for a competition and I have no clue what it should be about. Please make it school appropriate.

Answers

Answer: I think a podcast about growing up/changes, common struggles that people might not address, a type of motivational talk/speech(that's like really deep and puts a different perspective on life). You could do something about being a gen-z(including a comedic twist), maybe create a lighter mood on some current evens.

Some other ideas:

- the history/ journey of a tv show or movie

- biography of someone who was forgotten in history

-bucket list challenge

- growth challenge(could include getting better grades, becoming a better person, like personal growth stuff)

That is pretty much it.

Explanation:

what is the main purpose of the circulatory system

Answers

The network of blood vessels and the heart that carries blood throughout the body. This system helps tissues get the right amount of nutrients, oxygen, and waste disposal.

The most important component of the circulatory system?

The primary function of the circulatory system is to carry oxygen, nutrients, and hormones to the muscles, tissues, and organs throughout the body. Another role of the circulatory system is to remove waste from cells and organs so that your body can eliminate it.

What is the primary goal of this quiz about the circulatory system?

The circulatory system's job is to provide nutrients and oxygen to body cells while returning carbon dioxide and oxygen-poor blood to the heart and lungs.

To know more about circulatory system visit:-

https://brainly.com/question/29259710

#SPJ4

which wireless standard provides a range of 150 feet and is the oldest standard still in use and supported by wireless routers?

Answers

802.11b. The 2.4 GHz frequency of the original 802.11 standard was utilised by 802.11b. It had a range of up to 150 feet and could theoretically transmit data at a maximum rate of 11 Mbps.

What is more dated, WEP or WPA?

Wi-Fi protected access, or WPA, is a network security standard that has replaced the outdated Wired Equivalent Privacy (WEP) system and is now required for wireless networks to safeguard them via authentication and encryption.

Does WEP still have support?

Although it is occasionally still used, WEP security is now regarded as being out of date. This could be because network administrators haven't changed the wireless routers' default security settings or because outdated hardware can't handle newer encryption technologies like WPA.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

What is BM(of KARD)'s favorite color,I'm making a Powerpoint about K-Pop because my teacher asked me to,and for me to give them some song reccomendations(I have that covered though UwU).
Thanks!

Answers

Answer:

I don't even know but hey fellow K-Pop stannnnn

A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called

Answers

A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.

In the field of artificial intelligence (AI), a bot is an abbreviation for robot.

A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.

Read more: https://brainly.com/question/21656851

Most people know someone at school or at work with whom they don't really associate. Pick someone in your school whom you may have classes with but don't really know. Write down what you think you know about the person. Then, speak with that person and write a note about what you learned. Write an additional paragraph at the end, discussing how taking the time to get to know someone can make a difference.​

Answers

i’m afraid you are going to have to interact with your classmate and participate in this on your own. however for the last part, i would say that taking time to get to know somehow can lead you down a great path and lead you to great people and family and friends and can really pave your life.

100 POINTS!!! WRITE IN PYTHON! Use the tkinter module

100 POINTS!!! WRITE IN PYTHON! Use the tkinter module

Answers

A good example of code that uses the Tkinter module in Python to create a canvas widget and draw the planets of our solar system is given below.

What is the python program?

This piece of code constructs a window that contains a canvas widget to display an illustration of the Sun along with all the planets in our solar system.

Each planet has been enlarged for better visibility and the distances between them have also been proportionately  increased. The create_text method is employed to assign labels to every planet. The distances and radii utilized in this code are not depicted to scale.

Learn more about   python from

brainly.com/question/26497128

#SPJ1

See text below

12. Solar System

Use a Canvas widget to draw each of the planets of our solar system. Draw the sun first, then each planet according to distance from the sun (Mercury, Venus, Earth, Mars, Jupiter Saturn, Uranus, Neptune, and the dwarf planet, Pluto). Label each planet using the create_text method.Write in python using the tkinter module

100 POINTS!!! WRITE IN PYTHON! Use the tkinter module
100 POINTS!!! WRITE IN PYTHON! Use the tkinter module

You have written a search application that uses binary search on a sorted array. In this application, all keys are unique. A co-worker has suggested speeding up access during failed searching by keeping track of recent unsuccessful searches in a cache, or store. She suggests implementing the cache as an unsorted linked-list.
Select the best analysis for this scenario from the list below:
A. In some circumstances this may help, especially if the missing key is frequently search for.
B. An external cache will always speed up the search for previously failed searches, but only if an array-based implementation is used.
C. This is a good idea as the the linked-list implementation of the cache provides a mechanism to access the first item in O(1) steps.
D. This is always a bad idea.

Answers

The option A is the correct answer.Option A is the best analysis for this scenario from the list below. Here's why:Explanation:The binary search algorithm is used to find a particular key in a sorted array. In the case of a failed search, it takes log2 n comparisons to determine that the key is not present in the array.

If the application frequently searches for the missing key, the time required to access the array can be reduced by storing recent unsuccessful searches in a cache or store.In certain scenarios, such as when the absent key is often looked for, this might help.

An unsorted linked-list can be used to implement the cache. In such a case, the linked-list implementation of the cache provides a way to access the first item in O(1) steps. It is preferable to keep an external cache. However, it will only speed up previously unsuccessful searches if an array-based implementation is employed.

To know more about key visit:-

https://brainly.com/question/31937643

#SPJ11

In the following scenario, which can a photo editor digitally do to photos that could not be done before?

A photo shoot for a new advertising campaign has just finished. The ad campaign is for a new line of makeup from an international beauty corporation. The photo spread includes several close-up shots of models wearing the different makeup products.


Add a soft focus to the image.

Remove freckles from the model’s face.

Add a warm glow to the entire photo.

Enhance the color of the makeup and tone down the color of the model’s skin.

Answers

Answer:

if you didn't yet already do the question think the answer is D

Explanation:

Why is it so important to have a checking account?

Answers

Answer: Having a checking account sets you up for financial success. Get access to your money quicker, complete financial transactions on your phone or tablet, rest assured that your money is protected, and easily track your spending so you can make better money choices.

Explanation: Hopefully this helps you. (pls don't report if wrong)

a checking account is a type of bank account that allows you to easily deposit and withdraw money for daily transactions. so if you want to give someone money or if you want to receive money, you use a checking account. could you give me brainliest? its totally okay if not!

Who are the stakeholders and their interests in your decision whether to knowingly download music off of the internet without permission and without paying a royalty in violation of copyright laws? (you need 6 stakeholders and their interests)

Answers

The stakeholders in unauthorized music downloads include musicians, labels, platforms, consumers, enforcement agencies, and ISPs.

What are the interests of key stakeholders in unauthorized music downloads?

In the decision to engage in unauthorized music downloads, there are several stakeholders with distinct interests. Firstly, musicians and artists are directly impacted as their intellectual property is being infringed upon, leading to potential financial losses. They rely on royalties and sales of their music for income and recognition. Secondly, record labels, which invest in the creation and promotion of music, have a stake in protecting their artists' work and ensuring their own profitability.

Streaming platforms also have a significant interest as they operate within the legal framework and often have licensing agreements in place with copyright holders. Unauthorized downloads can undermine their business models and relationships with artists and record labels. Consumers, on the other hand, may be driven by the desire to access music conveniently and at no cost, which conflicts with the interests of other stakeholders.

Copyright enforcement agencies, such as copyright offices and legal organizations, aim to protect the rights of creators and ensure that copyright laws are upheld. Unauthorized downloads pose challenges to their efforts in safeguarding intellectual property rights. Lastly, internet service providers may have an interest in promoting lawful and responsible use of their networks, as they can face legal consequences or reputational damage if their networks are used for illegal activities like copyright infringement.

Learn more about stakeholders

brainly.com/question/31679631

#SPJ11

Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.

Answers

#include <iostream>

#include <vector>

#include <numeric>

int main() {

   

   std::vector<int> store(3);

   

   for(int i=0;i<3;i++){

       std::cout << i+1 << ". test result: ";

       std::cin>>store[i];

   }

   

   for(int i=0;i<3;i++) {

       std::cout << i+1 << ". test score: " << store[i] << std::endl;

   }

   

   std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;

   return 0;

}

Duolingo Duolingo courses make use of bite-sized, engaging lessons to teach real-world reading, listening, and speaking skills. With the use of artificial intelligence and language science lessons are tailored to help more than 500 million users learn at a personalized pace and level. Duolingo's strategy is to offer learning experiences through structured lessons with embedded test questions, in-person events, stories, and podcasts. This platform is offered in web-based and app formats for Android and iPhone Perform a PACT analysis on the Duolingo platform. Include a minimum of two remarks per component. (10 Marks)

Answers

PACT analysis refers to Political, Economic, Social, and Technological analysis. This is a tool used in the analysis of the external macro-environmental factors in relation to a particular business.

It helps identify various factors that may impact an organization. Below is the PACT analysis for the Duolingo platform. Political analysis Duolingo is not affected by political issues in the countries it operates in. The company is very successful and operates globally.

Economic analysis Duolingo’s prices are relatively lower than other competitors. The platform is free to use, and users only pay a subscription fee for some advanced features. Social analysis Duolingo courses make use of bite-sized, engaging lessons to teach real-world reading, listening, and speaking skills. The platform is designed to be accessible to everyone, and it provides a fun way for users to learn. Technological analysis Duolingo uses artificial intelligence and language science to provide personalized learning experiences. The platform is available in web-based and app formats for Android and iPhone, making it easy for users to access the platform on different devices.

Know more about PACT analysis here:

https://brainly.com/question/1453079

#SPJ11

Which type of computer serves as the heart of the computing systems for many, perhaps most, major corporations and government agencies

Answers

Answer:

Mainframes

Explanation:

Mainframes are utilized by many major corporations and government agencies. They are also used in banking, accounting, and healthcare to name a few.

sign that your desktop may need cleaning​

Answers

Answer:

My desktop may need be cleaning but for real!!

true or false? in developing the communication program, the medium refers to who will be delivering the message.

Answers

False. The medium refers to the channel or platform through which the message will be delivered.

What is communication program?

A communication program is a type of software application or platform used to facilitate communication between users or groups. This can include email, text messaging, video conferencing, and other forms of digital communication. Communication programs often feature tools to help manage conversations and store data, as well as provide security and privacy controls. Many communication programs also integrate with other services and platforms, such as social media, to provide a more seamless experience. Communication programs can be used for a variety of purposes, from personal communication to business and team collaboration.

To learn more about communication program
https://brainly.com/question/26152499
#SPJ4

Consider the following code segment.
int total = 0;
for (int k = 0; k <= 100; k += 2)
{
total += k;
}
Which of the following for loops could be used to replace the for loop in the original code segment so that the original and the revised code segments store the same value in total?
A. for (int k = 0; k < 100; k += 2)
{
total += k + 1;
}
B. for (int k = 1; k < 101; k += 2)
{
total += k - 1;
}
C. for (int k = 0; k <= 101; k += 2)
{
total += k + 1;
}
D. for (int k = 1; k <= 101; k += 2)
{
total += k + 1;
}

Answers

The loops in each code segment end when I equals 10, hence the output of the code segments is the same.

The method call will now result in a run-time error because it tries to access a character at index 7 in a string whose last element is at index 6, even though it used to work without a problem.

FOR LOOPS and WHILE LOOPS are two popular types of loops. While a While loop runs a fixed number of times, a For loop runs a variable number of times.

There are primarily two kinds of loops: When a sequence of instructions is repeated dependent on whether a condition evaluates as True or False, this process is known as condition-controlled iteration (also known as endless iteration). While loops, do while loops, and repeat till loops are a few examples of condition-controlled iteration.

Know more about loops here:

https://brainly.com/question/14390367

#SPJ4

IS ANYONE ELSE JUST GETTING PPL PUTTING LINKS WHEN U ASK A QUESTION???

Answers

UGH IKR, LIKE JUST ANSWER THE FRICKIN QUESTION
Yes It is so annoying

the combo box (form control) option in macros can be used to substitute for ___ when doing scenario analysis. a review laterb goal seekc data table solver d data validation

Answers

The combo box (form control) option in macros can be used to substitute for data validation when doing scenario analysis.

Before data is used in a business process, it must be validated to ensure its integrity, accuracy, and structure. The outcomes of a data validation operation can be used to train a machine learning model, conduct data analytics, or provide business intelligence.

The process of validating and verifying data that has been collected prior to its use is known as data validation. To guarantee accurate results, all data handling tasks—collecting, analyzing, or structuring for presentation—must include data validation.

Know more about data validation, here:

https://brainly.com/question/31233520

#SPJ11

Other Questions
The coordinates of the vertices of quadrilateral CDEF are C(6, 6), D(6, 8), E(8, 10), and F(10, 8). The figure is rotated 90 about the origin. What are the vertices of the resulting image, Figure CDEF? Drag numbers to complete the coordinates. What are the main elements that one would be expected to provide in your APA formatted first and final draft of a written paper ? Using the guidelines for general formats by Purdue, Identify the four main elements and list and describe their main purposes. Be specific on what should be addressed in each of these sections. Clayborn Corporation's net cash provided by operating activities was $118.800: Its net income was $105.000, its income taxes were $44700, its capital expenditures were $93,600, and its cash dividends were $30,200. Required: Determine the company's tree cash flow (Negative amounts should be indicated by a minus sign.) Free cash flow Who are the two people conversation in the poem Mending Wall? 100 Points! Geometry question. Photo attached. Please show as much work as possible. Thank you! What countries are in Latin America map? Write a short summary about In Response to Executive Order 9066: All Americans of Japanese Descent Must Report to Relocation Centers by Dwight Okita The adjusted trial balance for Carla Vista Ltd. at October 31, 2021, contained the following: Accounts payable $58,910 Income tax payable $6,103 Accounts receivable 106,860 Notes payable 220,915 Allowance for doubtful accounts 4,506 Interest expense 50.305 Bonds payable, due 2024 462,600 Lease liability 40,937 Interest payable 16,450 Note receivable, due December 2022 36,700 Income tax expense 12,121 Unearned revenue 10,770 Of the lease liability amount, $27,966 is due within the next year. Total payments on the note payable in the next 12 months will be $22,054, of which $10,994 is for interest. Carla Vista reported profit for the year ended October 31, 2021, of $36,270. Total assets are $2,005,571. Prepare the liabilities section of the balance sheet. (Enter account name only and do not provide descriptive information.) CARLA VISTA LTD. Balance Sheet (Partial) Liabilities and Shareholders' Equity $ Calculate Carla Vista's debt to total assets and interest coverage ratios for the year ended October 31, 2021. (Round debt to assets to 0 decimal places, eg. 75% and interest coverage to 1 decimal place, eg. 52.7.) Debt to total assets % Interest coverage times the characteristic of bearing young alive, giving birth to babies (rather than laying eggs). Compare the features of the classical economic model to the Keynesian economic model. How do these models influence the aggregate demand curve and the aggregate supply curve? Which model, in your opinion, benefits the economy in the long-run? I have to do it today fast What explains the presence in living humans of DNA sections which are identical to DNAfound in Neanderthals who lived 40 000 years ago? 12 men can dig a hole in 8 days. How many men can dig it in 6 days ? ? If the length of a rectangle is L and the width is w, write an algebraic expression for the perimeter of the rectangle.Tysm in advance! Figure ABCD is reflected across the y-axis.What are the coordinates of A' B', C. and D'?Enter your answer by filling in the boxes.AOD10-0-7B'ODD'OD Why does the human body need proteins What is the measure of angle B? Plan for Requirements GatheringObjective: Upon completion of this module, you will be able to choose an appropriate methods and protocols for gathering requirements. Student Instructions: 1. Indicate at least three tasks to be comp Can someone plz help me? :( how did the dispute between france and england over the resources of the Ohio river valley eventually lead to an alliance between france and the United States