1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Select ALL of the statements that are true:

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Answer:

a. Datums can be established through trigonometric leveling.

d. Geoid models have improved through time.

e. NGVD29 was matched to more tidal stations than NAVD88

Explanation:

a. Datums can be established leveling with trigonometric form, is a method to determinate different elevations.

d. Geoid models have been improved through time in the gravimetric geoid model and increase accuracy, actually, these models keep refining, there were errors ins this models, nowadays are more accurate.

e. NGVD29 was matched by tidal stations more than NAVD88.

NGVD29 was established by 26 tidal gauges in United Stated and Canada, maps were prepared, but NGVD29 was replaced because is less accurate than NAVD88.

NAVD88 were not used Additional tidal.

False sentence

b. The average sea level doesn't correspond to our current vertical data, this depends on our location.

For example

Rinconada in Peru is the highest human establishment in the world to 5100 m.

Everest is the highest summit in the world to 8848 m.

This marker indicating the sea level is located in Jerusalem.

c. Often is used levels, but there are other methods like set-up, bench mark.

f. the Dynamic heights are not the same as orthometric heights, because the dynamic heights are perfect, but the orthometric heights can change slightly, in a few words are imperfect heights.

You might be interested in
50 points please!!
MA_775_DIABLO [31]

Answer:

poopypoopypoopypoopy

6 0
3 years ago
A keyboard shortcut is a key or combination of keys that you press to access a feature or perform a command. ___________________
andrey2020 [161]
I believe that this is true.
Ctrl+F
Ctrl+C
Ctrl+V
These are all keyboard shortcuts.

8 0
3 years ago
The ________ of the operating system enables users to communicate with the computer system. Select one: A. user interface B. mod
Mumz [18]
The user interface of the operating system
8 0
3 years ago
Which sql server 2012 edition is targeted at hosted, internet-facing deployment?
Mice21 [21]
<span>The Web version will work for this type of need. This version runs at a slightly lesser capability than the full version, but will still perform many of the advanced functions of SQL Server. The processor and RAM utilizations are a bit less than the maximum provided in other versions.</span>
7 0
3 years ago
Write the definition of a function named printpoweroftwostars that receives a non-negative integer n and prints a line consistin
Aleksandr-060686 [28]
To accomplish this without using a loop,
we can use math on a string.

Example:
print("apple" * 8)

Output:
appleappleappleappleappleappleappleapple

In this example,
the multiplication by 8 actually creates 8 copies of the string.

So that's the type of logic we want to apply to our problem.

<span>def powersOfTwo(number):
if number >= 0:
return print("*" * 2**number)
else:
<span>return

Hmm I can't make indentations in this box,
so it's doesn't format correctly.
Hopefully you get the idea though.

We're taking the string containing an asterisk and copying it 2^(number) times.

Beyond that you will need to call the function below.
Test it with some different values.

powersOfTwo(4) should print 2^4 asterisks: ****************</span></span>
4 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • 30
    5·1 answer
  • A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
    6·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • What's another word for contact print?
    15·2 answers
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • What’s Discord Packing?
    8·2 answers
  • Diffreciate between primary source of information and secondary source of information​
    5·1 answer
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!