1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
13

A model release can be either oral or written down. true or false

Computers and Technology
2 answers:
MAVERICK [17]3 years ago
5 0
The correct answer is true
snow_lady [41]3 years ago
3 0
The answer is probably true
You might be interested in
How do you represent a 3D object with unusual curves in 2D space? CAN SOMEONE HELP PLEASE
levacccp [35]
You have to draw the extra lines out
7 0
3 years ago
Write the program to solve quadratic equations, but if the discriminant is negative, output
Firdavs [7]

Answer:

PROGRAM  QuadraticEquation Solver

  IMPLICIT  NONE

REAL :: a, b, c ;

  REA :: d ;

  REAL  :: root1, root2 ;

//read in the coefficients a, b and c

  READ(*,*)    a, b, c  

  WRITE(*,*)   'a = ', a

  WRITE(*,*)   'b = ', b

  WRITE(*,*)    'c = ', c

  WRITE(*,*)

// computing the square root of discriminant d

  d = b*b - 4.0*a*c

  IF (d >= 0.0) THEN              //checking if it is solvable?

     d     = SQRT(d)

     root1 = (-b + d)/(2.0*a)     // first root

     root2 = (-b - d)/(2.0*a)     // second root

     WRITE(*,*)  'Roots are ', root1, ' and ', root2

  ELSE                            //complex roots

     WRITE(*,*)  'There is no real roots!'

     WRITE(*,*)  'Discriminant = ', d

  END IF

END PROGRAM  QuadraticEquationSolver

8 0
3 years ago
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryp
Vesna [10]
Answer is (HMAC) Hashed Message Authentication Code

This combines authentication via a shared secret cryptography algorithm key with hashing. It involves the client and server each with a private key. The client creates a unique hash per request to the server through hashing the request with private keys.






3 0
3 years ago
Sam's take-home pay is $743. His deductions are $25 for OASDI, $5 for Medicare, and $27 for income tax. What is his gross pay? A
Katarina [22]

<u>Answer:</u>

A. $686.00

<u>Reasoning:</u>

25+5+27=57 So the total amount of the deductions is $57

Subtract 57 from 743

743 - 57 = 686

So he is left with 686

5 0
3 years ago
__________________________would be involved in projects such as implementing security measures and software to protect systems a
defon

<u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

<h3>What does an administrator of a network do?</h3>

The  network administrator is known to be a person who is involved in the day-to-day management of these networks is the responsibility of network and computer system administrators.

They function by helping to plan, set up, and provide maintenance for a company's computer systems, etc., for data communication.

Therefore, <u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

Hence, option D is correct.

Learn more about Network Administrator from

brainly.com/question/5860806
#SPJ1

3 0
1 year ago
Other questions:
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using
    15·1 answer
  • This exercise asks you to write a program that tests some of the built-in subroutines for working with Strings. The program shou
    12·1 answer
  • With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
    6·1 answer
  • Explain how technology is related to human needs and wants?
    13·1 answer
  • What is the name of the newer communication protocol that is supported by Window 10's version of TCP/IP?
    11·1 answer
  • Which of the following are disadvantages of networks? Check all of the boxes that apply.
    14·1 answer
  • Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________
    5·1 answer
  • The merge and center
    14·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!