1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
14

Survey Q. Non-scoring: What role is played in the team? (1 correct answer)

Computers and Technology
1 answer:
Maurinko [17]3 years ago
4 0
I really don’t kno the answer to this question sorry
You might be interested in
Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?
lesya [120]
Is a Microsoft Bing ads certification Exam question.
I think that the correct answer is:
False

Source and more info: <span>https://goo.gl/JUw7Bw</span>
3 0
3 years ago
"Create a Matlab Scrapt that will take the a Matrix A and Matrix B (of AX=B), then calculate the Determinant of Matrix A, Invers
prohojiy [21]

Answer:

see explaination

Explanation:

function [] =

inverse(A,B)

da = det(A);

disp("The det of A is");

disp(da);

inva = inv(A);

disp("The inverse of A is");

disp(inva);

x = inva*B;

disp("The value of X is");

disp(x);

rk = rank(A);

disp("The rank of X is");

disp(rk);

Di = eig(A);

disp("The eigen values of A is");

disp(Di);

[V,Di] = eig(A);

disp("The eigen vectors of A are (Each column represents one column vector)");

disp(V);

end

A = [1,2;4,5];

B = [1,2;4,5];

inverse(A,B);

%ab = [num2str(t)," ",num2str(dx)," ",num2str(dy)];

%disp(ab);

4 0
3 years ago
Describe some common types of charts.​
Mekhanik [1.2K]
Bar chart.
Pie chart.
Line chart.
4 0
3 years ago
Read 2 more answers
Which option best explains the goal of computer science?
skad [1K]

Answer:

B correct answer b i think so

8 0
3 years ago
Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
vivado [14]

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

3 0
3 years ago
Other questions:
  • 7.12 LAB: Contains the character
    12·2 answers
  • What are some situations where you might find it useful to use the “!” symbol in a program?
    9·1 answer
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·1 answer
  • If you can photoshop please text me i need help for my digital media class 7862381441
    9·1 answer
  • Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
    6·1 answer
  • On the MarketingConsultants worksheet, in cells D10:H13, use a PMT function to calculate the end of the month payment amount. En
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!