answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergejj [24]
2 years ago
6

Sensors and devices connected to a model are examples of which of the following?

Computers and Technology
2 answers:
fomenos2 years ago
6 0
The answer would be c data sources
Olin [163]2 years ago
4 0
The answer is C date sources
You might be interested in
Question _.1 with 1 blankMiguel y Maru están muy cansados. Question 2 with 1 blankFelipe es muy joven. Question 3 with 1 blankJi
Alekssandra [29.7K]

Answer:

Miguel y Maru están muy cansados.  - Miguel y Maru están cansadísimos

Felipe es muy joven. - Felipe es jovencísimo

Jimena es muy inteligente. - Jimena es inteligentísima

La madre de Marissa está muy contenta. - La madre de Marissa está contentísima

Estoy muy aburrido. - Estoy aburridísimo

Explanation:

In this activity we have to switch the statements to the absolute superlative of the expressions. In Spanish we can add the suffix -ísimo to an adjective to refer to the highest degree of something. It can be translated in ENglish to "really, extremely, super or quie". The statements in English are:

- Miguel and Maru are very tired - Miguel and Mary are extremely tired

- Felipe is very young - Felipe is super young

- Jimena is very smart - Jimena is really smart

- Marissa´s mother is very happy - Marissa´s mother is extremely happy

- I´m very bored - I´m super bored

8 0
2 years ago
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
Ivan

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

8 0
1 year ago
The initial value for a number field on a record is 1. A user updated the value of the number field to 10. This action invokes a
erik [133]

Answer: b. 11

Explanation:

//The  initial value is 1

//let call the value as x

x = 1

//then the user updated the value to 10

//so now x is 10

x = 10

// and update the workflow to 11

//so now the value of x is 11

x = 11

even if the programmer print x, so the output will be 11

3 0
2 years ago
Which of the following is not true of how computers represent complex information
mote1985 [20]

Answer: c. Depending on context the same sequence of bits may represent different types of information.

Explanation:

The options for the question are:

A. Computing devices use patterns of bits to represent complex information

B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

C. Depending on context the same sequence of bits may represent different types of information

D. Common abstractions that are represented by computing devices include numbers, characters, and color.

The following are true of how computers represent complex information:

• Computing devices use patterns of bits to represent complex information

• helps represent complex information by surfacing complexity that might otherwise be hidden

• Common abstractions that are represented by computing devices include numbers, characters, and color.

Therefore, the option that is not true of how computers represent complex information is that "depending on context the same sequence of bits may represent different types of information".

5 0
2 years ago
Read 2 more answers
The symbol asterisk(*) in a select query retrieves​
Natali [406]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The symbol asterisk (*) in a select query retrieve all result of column in the table. For example, table named "employee" has three column such as <em>id, name, address</em>.

To apply the symbol asterisk (*) in select querry select all the columns in the result.

for example:

select * employee;

this query statement selects all columns of table "employee" in the result.

3 0
2 years ago
Other questions:
  • When preparing a spreadsheet that contains population data for different nations, what is the best way to provide a visual compa
    12·2 answers
  • Multiple boolean expressions can be combined by using a logical operator to create ________ expressions.
    10·1 answer
  • What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
    10·1 answer
  • Which of the following blocks is least similar to the others?
    8·2 answers
  • What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation
    9·1 answer
  • 1. Write a set of routines for implementing several stacks and queues within a single array. Hint: Look at the lecture material
    15·1 answer
  • Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 di
    11·1 answer
  • Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
    13·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • Describe the output when the following code executes in 64-bit mode: .data dividend_hi QWORD 00000108h dividend_lo QWORD 3330002
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!