1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
15

Enlist the various data analysis methods for study of Infrasonic waves, Seismic waves, Earthquake prone areas and how AI can be

used for future predictions?
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
5 0

Answer:

Throughout the clarification segment below, the essence including its query is mentioned.

Explanation:

  • The analytical techniques utilize magnetic fields that allow the waves to be analyzed.
  • They sometimes use echolocation strategies.
  • It is possible to be using artificial intelligence to research potential forecasts. Climate, improvements throughout the climate as well as other things.
  • Like toxic waves, this will be capable of predicting tides.
You might be interested in
On CLIENT3, open Windows Explorer as Administrator. Open properties for C:\Program Files and select the Security tab to view the
defon

Answer:

1). Read & execute

2). List folder contents

3). Read

Explanation:

See image

5 0
3 years ago
Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. Which stage of t
kodGreya [7K]

Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. The next stage for Keira is CODING.

Explanation :

  • SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.
  • SDLC involves several distinct stages, including planning, design, building, testing, and deployment. Popular SDLC models include the waterfall model, spiral model, and Agile model.
  • The steps of the SDLC are given below :
  • Identify the current problems. “What don’t we want?”
  • Plan. “What do we want?”
  • Design. “How will we get what we want?”
  • Build. “Let’s create what we want.” This SDLC stage develops the software by generating all the actual code. If the previous steps have been followed with attention to detail, this is actually the least complicated step.
  • Build is the phase which Keira should move onto in the SDLC
  • SDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal up front and see a clear plan for arriving at that goal. Everyone understands the costs and resources required.
7 0
3 years ago
Read 2 more answers
Which data type is 2.5?<br> single<br> int<br> float<br> string
Ivenika [448]

2.5 is an example of a float.

Floats are numbers that have decimals.

5 0
3 years ago
A professional development plan allows an employee to
drek231 [11]
Answer: (B) evaluate current skill level and determine what skills are necessary to advance

Explanation: A professional development plan is used to assess your current skills and see what’s needed to further advance within the field.
7 0
3 years ago
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not
7nadin3 [17]

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

6 0
3 years ago
Other questions:
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • One emerging type of trojan horse is called a ____-access trojan.
    14·1 answer
  • When do posts on social media networks disappear? A. After 5 years B. Once you've posted enough where it's too far to scroll bac
    5·2 answers
  • Which of the following apply to the definition of Wide Area Networks? Check all of the boxes that apply.
    7·2 answers
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • What is your favorite food
    11·2 answers
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • 1.Discuss the differences and similarities between a peer-to peer network and a client server network.
    8·1 answer
  • write a program in pseudo code to solve the following: covert a temperature input in degrees Celsius to degrees Fahrenheit and d
    14·1 answer
  • Я люблю есть гнезда петух
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!