1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Select ALL of the statements that are true:

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Answer:

a. Datums can be established through trigonometric leveling.

d. Geoid models have improved through time.

e. NGVD29 was matched to more tidal stations than NAVD88

Explanation:

a. Datums can be established leveling with trigonometric form, is a method to determinate different elevations.

d. Geoid models have been improved through time in the gravimetric geoid model and increase accuracy, actually, these models keep refining, there were errors ins this models, nowadays are more accurate.

e. NGVD29 was matched by tidal stations more than NAVD88.

NGVD29 was established by 26 tidal gauges in United Stated and Canada, maps were prepared, but NGVD29 was replaced because is less accurate than NAVD88.

NAVD88 were not used Additional tidal.

False sentence

b. The average sea level doesn't correspond to our current vertical data, this depends on our location.

For example

Rinconada in Peru is the highest human establishment in the world to 5100 m.

Everest is the highest summit in the world to 8848 m.

This marker indicating the sea level is located in Jerusalem.

c. Often is used levels, but there are other methods like set-up, bench mark.

f. the Dynamic heights are not the same as orthometric heights, because the dynamic heights are perfect, but the orthometric heights can change slightly, in a few words are imperfect heights.

You might be interested in
Which of these is an online presentation tool?
Marina86 [1]
Google slides is and online presentation tool
5 0
3 years ago
Read 2 more answers
Two independent customers are scheduled to arrive in the afternoon. Their arrival times are uniformly distributed between 2 pm a
seraphim [82]

Answer:

1/3

Explanation:

T₁ , T₂ , be the arrival times of two customers.

See expected time for the earliest and latest below.

The formulas used will guide you.

4 0
3 years ago
2. Trace through the following loop and show the values for A, B & C.
Butoxors [25]

At the beginning, we have

A = 4, B = 3, C = 0

Although you didn't specify the programming language, usually 0 means false, so we never enter the first loop, because "while C" is never true.

We enter the second loop because B is different from A, so we decrease C by 1, and we have

A = 4, B = 3, C = -1

and we assign B = B-C, so now B becomes 3-(-1)=3+1=4. Now B=A and we exit the second loop, and we have

A = 4, B = 4, C = -1

4 0
3 years ago
What is the name of the organization responsible for assigning public ip​ addresses?.
IgorC [24]

The worldwide body in charge of managing and supervising the coordination of the Internet's domain name system  is called the Internet Corporation for Assigned Names and Numbers (ICANN).

The Internet Engineering Task Force (IETF) is a sizable, open, and global community of network architects, operators, vendors, and academics with a focus on the development of the Internet architecture and the efficiency of its operation. Any anybody with an interest is welcome to join the IETF.

The IETF's working groups, which are categorized into various sections by topic, carry out the technical work for the organization (e.g., routing, transport, security, and more). Three times a year, the IETF organizes meetings, but the majority of the work is done via mailing list.

To know more about Internet  click here:

brainly.com/question/5787501

#SPJ4

6 0
1 year ago
How can file signature in headers be used to reinforce the identification of files with different extension names in forensic au
lions [1.4K]

Answer:

A file header is a 'signature' placed at the beginning of a file, so the operating system and other software know what to do with the following contents. Many electronic discovery applications will use the file header as a means to verify file types.

Explanation:

7 0
2 years ago
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.
    5·1 answer
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • The five steps in the fetch/execute cycle and how do they correspond to a restaurant
    5·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • What two things can you do to display the entire content of a cell? ​
    5·1 answer
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • How do u mark bralienst
    5·1 answer
  • What are the pros and cons for E-trade?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!