1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
6

A sonar operator on a battleship looks at a display that contains a spatial layout of the distribution of echoes from the surrou

nding ocean. A submarine appears as a more intense cluster of echoes. We can think of this as a signal detection problem. The sonar operator looks at the display an ________
Computers and Technology
1 answer:
ankoles [38]3 years ago
8 0

Answer:

The sonar operator looks at the display a forms an internal representation of the strength of the evidence that a submarine is present. If this exceeds an internal, subjective threshold,the sonar operator tells the captain that a submarine is present.

You might be interested in
Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variable
lisov135 [29]

Answer:

Is this a question or an answer

7 0
3 years ago
Cheri needs to write a small program that interacts with the user. What step will allow her to do this?
Alinara [238K]

Answer:

Including a input statement

Explanation:

You need a input statement in order for it to work, here´s an example;

script.parent.click <u>then</u>

you need the ¨.mouse¨ after parent or it wouldnt work.

8 0
3 years ago
Read 2 more answers
Both employers and employees have responsibilities and ___________.
Alex787 [66]

I would guess that the answer is Rights.

4 0
3 years ago
Read 2 more answers
A characteristic of a 3D model that a 2D model does not have is:
Bas_tet [7]

Answer:

Volume

Explanation:

A characteristic of a 3D model that a 2D model does not have is:

<em>Volume</em>

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST UWU</em><em> </em>

3 0
3 years ago
The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
amid [387]

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

5 0
2 years ago
Other questions:
  • What would be some long- term goals.
    11·1 answer
  • Consider the following method:
    8·2 answers
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
    9·1 answer
  • What is the radix transformation method?
    5·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • Which term refers to the blank areas surrounding a document page? *
    15·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Laptops are used for accessing the internet. Name two advantages and two disadvantages for using a laptop rather than a smartpho
    5·2 answers
  • Is orgenized maningful and useful data​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!