1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
12

Which of the following statements is true?

Computers and Technology
1 answer:
USPshnik [31]3 years ago
8 0

Answer: (A) Computer science trends to deal with the data.

Explanation:

 The computer science basically tend to deal with the big data and data science as it is the emerging technologies with the upcoming years.

As, with the large amount of the data and high transmission rate we can easily developed new computing technologies with low budget.  

Data is basically defined as simple facts and figures and contain information that is very useful for developing the computing technology for study and processing the system.

Therefore, Option (A) is correct.

 

You might be interested in
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
you have an ipv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement
Soloha48 [4]

Answer:

Teredo tunnelling

Explanation:

The tunnelling method that will fit best in the situation is teredo tunnelling. The reason are embedded in its characteristics, they include;

Teredo tunneling has the following characteristics: Its tunnel endpoints are configured on hosts. The hosts are dual stack hosts and perform tunneling of ipv6 to send on the ipv4 network works through NAT the only solution that allows ipv4-only hosts to communicate with ipv6-only hosts is NAT-PT.

7 0
3 years ago
The (X , y) coordinates of a certain object as a function of time' are given by Write a program to determine the time at which t
ra1l [238]

Answer:

t = [0:0.01:4];

x = 5*t - 10;

y = 25442 - 120*t + 144;

d = x.^2 + y.^2;

min = 1e+14;

for k = 1:length(t)

if d(k) < min

min = da(k);

tmin = t(k);

end

end

disp('The minimum distance is: ')

disp(sqrt(min))

disp('and it occurs at t = ')

disp(tmin)Output:

>> withLoop

The minimum distance is:

2.5106e+04

and it occurs at t =

4

Explanation:

4 0
3 years ago
In which decade did cell phones become available to the public?
JulijaS [17]

Answer:

1980s

Explanation:

Source:

https://www.cbc.ca/news/technology/5-major-moments-in-cellphone-history-1.1407352

6 0
3 years ago
Louisa wants to purchase a used SUV that costs $12,750 from an automobile superstore. She has $4,000 to make a down payment and
liq [111]

Answer:

its a numbre

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following subjects is considered technical education
    11·1 answer
  • You are working on a router that has established privilege levels that restrict access to certain functions. you discover that y
    5·1 answer
  • What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)
    11·1 answer
  • (Solved—15 Lines) In many jurisdictions a small deposit is added to drink containers to encourage people to recycle them. In one
    5·1 answer
  • Which characteristic describes the troposphere?
    10·1 answer
  • What is a System Software ?
    11·2 answers
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • In a typical day, what types of Computer-Mediated Communication do you use?
    8·1 answer
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
  • Why must the image be reduced when the field of view is widened to take in more of the scene?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!