1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kazeer [188]
3 years ago
13

Gathering information with your eyes is called

Computers and Technology
2 answers:
Ivahew [28]3 years ago
4 0
Observing, Looking, Collecting, there are a few words for "gathering information with your eyes". 
GaryK [48]3 years ago
3 0
I believe the answer would be visual <span>perception</span>
You might be interested in
The local area network software called a ____ server provides workstations with the authorization to access a particular printer
Oksana_A [137]

Answer:

I think Its a Wi-Fi

                         

6 0
3 years ago
the graph at left in the tctct, c-plane models the global wind power capacity, ccc, in gigawatts, ttt years since 199619961996.
Elena-2011 [213]

The intercept of a graph is the point where the graph crosses the axes of the graph.

The interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

On the graph (see attachment), we have the following observations

  1. The vertical axis represents the global wind power capacity (i.e. the c-axis)
  2. The horizontal axis represents the years since 1996 (i.e. the t-axis)

So, the c-intercept is the point that crosses the vertical axis.

From the graph, the curve crosses the c-axis at c = 7, and t = 0 (i.e. years = 1996)

Hence, the interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

<em />

<em />

Read more about intercepts at:

brainly.com/question/3334417

4 0
2 years ago
What aspect should you consider before adding pictures to a document? You should structure the (blank) first before you search f
Evgesh-ka [11]
I would be considering type of files that do not take up a lot of space, especially if you plan to email them
7 0
3 years ago
A network administrator attempted to access the company website and received a "page not found" error. The next day the administ
Iteru [2.4K]

Answer:

a DoS attack occurred

Explanation:

According to my research on information technology and cybersecurity, I can say that based on the information provided within the question he can conclude that a DoS attack occurred. This (denial-of-service) attack is when an individual sends a large amount of network authentication requests with an invalid return address and overloads a server until it crashes. Which is why the company website says "page not found". All of these requests are usually from a single computer, which is also why they all originated from the same IP in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Which security option should be used to ensure the integrity and validity of an Access database?
Fynjy0 [20]

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

3 0
3 years ago
Read 2 more answers
Other questions:
  • What materials where used to make the first gps
    7·1 answer
  • Mm
    10·1 answer
  • The recommended flux for electrical soldering is A. antimony. B. sal ammoniac. C. rosin. D. muriatic acid.
    9·1 answer
  • Why would a user want to compress a large file before sending it as an email attachment?
    13·2 answers
  • As a consommé simmers, the meat and eggs coagulate, forming a
    6·1 answer
  • 2min speech on can teachers be replace by technology​
    5·1 answer
  • Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
    5·1 answer
  • HURRRY WILLL GIVE BRAINLIST!!!!!!
    12·1 answer
  • What facilitates the automation and management of business processes and controls the movement of work through the business proc
    9·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!