1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
11

What are two distinctive types of unmanned aircraft systems

Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
8 0
Probes and Drones
Hope this helps and please give brainliest!
You might be interested in
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
I dunno what to write my memo thing about ⁻³⁻
Alex73 [517]

Answer:

Wdym? I could help u

Explanation:

5 0
3 years ago
Read 2 more answers
Which is a software configuration management concept that helps us to control change without seriously impeding justifiable chan
Darina [25.2K]

Answer:

Baselines

Explanation:

The idea of software configuration management is that of monitoring and controlling changes in the software. The baseline is the standard and formally accepted form of a software item that is meant to be configured. It is like a generally accepted reference point, which could be applied in effecting incremental changes in the software.

There are three types of baselines which are the functional, developmental, and product baselines. Functional baselines provide an overview of the functionality and specifications of a system. The product baseline encompasses both the functional and physical details of the system.

7 0
3 years ago
Many who move to business-oriented information security were formerly__________ who were often involved in national security or
kirill [66]

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

5 0
2 years ago
April's manager has asked her to provide the financial service manager with the accounts that have not received payment. What sh
Irina-Kira [14]
C should be the answer to this I hope that this helps
4 0
3 years ago
Read 2 more answers
Other questions:
  • How could you fact check a news report that you saw on television
    12·1 answer
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • There are 22 gloves in a drawer: 5 pairs of red gloves, 4 pairs of yellow, and 2 pairs of green. You select the gloves in the da
    12·1 answer
  • Florida Highway Safety and Motor Vehicles reported blank of traffic fatalities were alcohol-related in Florida in 2009.​
    8·1 answer
  • Pick the simplest line of code to test if the word "BASIC" is stored in the variable text1.
    12·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • You are going to create an Arduino sketch where you have two push buttons, one piezo, one
    10·1 answer
  • HELP ME PLEASE
    14·1 answer
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!