1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
4 years ago
11

Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.

hypotheses. d. data.
Computers and Technology
1 answer:
Leya [2.2K]4 years ago
6 0

Answer:

The answer is d. Data

Explanation:

information gathered from observing a plant grow 3 cm over a two-week period results in Data

data is facts and statistics collected together for reference or analysis.

Data is any information that has been collected, observed, generated or created to validate original research findings

You might be interested in
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
When using the strcat function, you must be careful not to overwrite the bounds of an array?
77julia77 [94]

If this is a true or false question the answer is true.

5 0
3 years ago
What is essence of computer systems and networks?​
Kamila [148]

Answer:

computer is a programmable device that can automatically perform a sequence of calculations or other operations on data without human aid. It can store, retrieve, and process data according to internal instructions

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

5 0
3 years ago
Why is the choice of form factor critical when building a computer from scratch
GuDViN [60]
The choice of form factor is critical when building a computer from the scratch because, the form factor determines the physical size of the mother board and all other components and ports that will be on the computer. It also determines the general locations of these components. There are different types of form factor in the market.<span />
5 0
3 years ago
Read 2 more answers
Are digital contract services that require senstive information safe?
ANEK [815]

Answer:

Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. Given the cost of a security breach—losing your customers’ trust and perhaps even defending yourself against a lawsuit—safeguarding personal information is just plain good business.

Some businesses may have the expertise in-house to implement an appropriate plan. Others may find it helpful to hire a contractor. Regardless of the size—or nature—of your business, the principles in this brochure will go a long way toward helping you keep data secure.

5 0
2 years ago
Other questions:
  • What allows people to create their own radio shows over the internet?
    14·1 answer
  • Using the College Registration example from Section 6.7.3 as a starting point, do the following:
    5·1 answer
  • A system administrator needs to create a high-performance SQL server. What type of disk configuration will allow the administrat
    7·1 answer
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • The term "resolution" refers to ______.
    6·2 answers
  • Rachael has been posting negative comments on several of her peers' social media pages. Which of the six Ps is Rachael abusing?
    15·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • The _________________ creates international guiding principles for computer forensic examiners.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!