1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
4 years ago
11

Which of the following STEM discoverers developed a new type of computer hardware?

Computers and Technology
1 answer:
PSYCHO15rus [73]4 years ago
7 0

Which of the following STEM discoverers is known for creating complex computational physics to develop computer models to simulate fluid movement?

Edison

Fedkiw

Gates

Hawking

Answer:

Fedkiw

Explanation:

Ronald Fedkiw is a professor at Stanford and also a STEM discoverer that is credited with developing a new type of computer hardware model which was used to simulate fluid movements.

His invention has helped him win various awards because it has helped professionals and technicians create visual effects for videos.

You might be interested in
Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
Luba_88 [7]

Answer:

The answer is "Option a"

Explanation:

It is an isolated region insulated from errors in most other Accessibility Areas and provides low-cost, network connectivity to all other Accessibility Locations in the same country. The positions of the AWS data centers were not described in terms of duplication regions, regional areas or computing areas, and wrong choices were explained as follows:

  • In option b, In the AWS there is no use of the replication area, that's why it's incorrect.
  • In option c, It is used in a single purpose, that's why it's incorrect.
  • In option d, It provides the accessibility to the user to access the large amount of data, that's why it is wrong.
4 0
3 years ago
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
3 years ago
Read 2 more answers
Notice that the iris.target array contains 3 different labels. Create a plot that you think is interesting using the data from t
Alexeev081 [22]

Answer:

from sklearn.datasets import load_iris

import seaborn as sns

import pandas as pd

data = load_iris()

final_data = data.data[:]

final_data = pd.DataFrame(final_data)

final_data.columns = ['SepalLengthCm', 'SepalWidthCm', 'PetalLengthCm', 'PetalWidthCm']

species = data.target[:]

final_data['Species'] = species

sns.pairplot(final_data, hue='Species')

Explanation:

8 0
3 years ago
In order to get a great sports photograph, you need to do what?
Alik [6]
The answer is Anticipate the action.  <span>In order to get a great sports photograph, you need to anticipate the action.  </span><span>A big part of </span>sports photography<span> is </span>anticipating action.  <span>The photographer will be able to anticipate the action so that the camera will be pointed in the right direction to capture the decisive moments on film</span>
8 0
4 years ago
Read 2 more answers
Other questions:
  • What percentage of the global population of about seven billion people used the Internet in 2012?
    5·2 answers
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • How to eject a flash drive from chromebook?
    6·1 answer
  • Stephen needs to insert a field into a building block that will contain variable data. Which keyboard shortcut can he use to tog
    6·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use
    7·1 answer
  • 3. A hyperlink is important because it allows you to ___________. (1 point) click on the link to go directly to a website insert
    9·1 answer
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
    12·1 answer
  • Terrell, a programmer, is creating a website for an online merchant and wants the program to calculate the total price based on
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!