1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Select ALL of the statements that are true:

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Answer:

a. Datums can be established through trigonometric leveling.

d. Geoid models have improved through time.

e. NGVD29 was matched to more tidal stations than NAVD88

Explanation:

a. Datums can be established leveling with trigonometric form, is a method to determinate different elevations.

d. Geoid models have been improved through time in the gravimetric geoid model and increase accuracy, actually, these models keep refining, there were errors ins this models, nowadays are more accurate.

e. NGVD29 was matched by tidal stations more than NAVD88.

NGVD29 was established by 26 tidal gauges in United Stated and Canada, maps were prepared, but NGVD29 was replaced because is less accurate than NAVD88.

NAVD88 were not used Additional tidal.

False sentence

b. The average sea level doesn't correspond to our current vertical data, this depends on our location.

For example

Rinconada in Peru is the highest human establishment in the world to 5100 m.

Everest is the highest summit in the world to 8848 m.

This marker indicating the sea level is located in Jerusalem.

c. Often is used levels, but there are other methods like set-up, bench mark.

f. the Dynamic heights are not the same as orthometric heights, because the dynamic heights are perfect, but the orthometric heights can change slightly, in a few words are imperfect heights.

You might be interested in
To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps
Law Incorporation [45]

Answer:

C++.

Explanation:

#include <iostream.h>

void main(int argc,char* arg[])  {

   // Arrays

   int x[100];

   int y[50];

   int z[50];

////////////////////////////////////////////////////////////////////////////

   int count = 0;

   for (int i = 0; i < 100; i+=2) {

       z[count] = x[i] * y[count];

       count++;

   }

for (int i =0; i < 5; i++) {

   cout<<z[i]<<endl;

}

getche();

}

5 0
3 years ago
30 POINTS! PLEASE ANSWER QUICK!!!
SpyIntel [72]

Answer:

your doctype comes first.

Explanation:

The first thing you should make sure to have in any HTML document you create is a "document type definition (DTD)" declaration.

it defines what elements and attributes are allowed to be used in a certain flavor of HTML

6 0
3 years ago
Name the following hardware device to write the data from hard disk to CD ​
lys-0071 [83]

Answer:

CD Writer or DVD Writer

Explanation:

The DVD Writer/CD Writer is a multipurpose rewriteable drive that can read audio, data, and video files and can record, or write, in both CD and DVD formats. This DVD Writer/CD Writer drive enables you to: Create custom audio, data, and video files that can be recorded onto CDs or DVDs. Store large amounts of data.

7 0
4 years ago
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually d
alexandr402 [8]

Answer:

Attenuation is the one-word answer which is the correct answer for the above question.  

Explanation:

Attenuation is a concept which told about the barrier, which is used to stop the signals in the connected network systems. Attenuation can be a form of any type of barrier like weak signals, or because of long-distance.

Following are the example which is in the form of attenuation--

  1. Noise
  2. The distance can also be a problem for weak signals.
  3. Hacker also disestablished the network signals.
  4. The physical objects.

Hence the attenuation can be formed by any of the barriers of signals, like physical obstruction, longer distance, and radio inference.

7 0
3 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • what would happen if a large number of computer users are attempting to access a web site at the same time that you are
    15·2 answers
  • What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
    10·1 answer
  • A computer can sort x objects in t seconds, as modeled by the function below:
    5·1 answer
  • When you must give something up in order to get something else it's called
    7·1 answer
  • Which type of software is for sale directly to consumers in stores and online?
    6·1 answer
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • Which strategies for effective presentations is Ian using in his opening? Check all that apply.
    8·2 answers
  • PLEASE HELP!!!
    11·1 answer
  • What are the importance of rules in the computer lab ?​
    12·1 answer
  • Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can b
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!