1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
5

Measurement consists of:__________

Computers and Technology
1 answer:
Naddik [55]3 years ago
3 0

Answer:

The answer is choice "a".

Explanation:

Measurement is a number allocation in which the entity or event attributes that would be comparable with other objects or events. Its scope and implementation depending on context and discipline.  

  • Its main purposes could be defined as measurements for efficiency, tracking, health, fitness (design, mounting), and solving problems.  
  • Its calculation consists of the numerical assignment, representing attribute amounts according to the rules for objects and events.
You might be interested in
If a network device has a mask of /28, how many IP addresses are available for hosts on this network?
Margaret [11]

Answer:

/28 -- 16 Subnets -- 14 Hosts/Subnet

14*16 = 224 hosts

Explanation:

see https://www.aelius.com/njh/subnet_sheet.html

3 0
3 years ago
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
The program below reads in the number of minutes entered by a user. The program that converts the number of minutes to hours and
Pavlova-9 [17]

Answer:

Written in Python:

hours = int(input("Hours: "))

mins = int(input("Minutes: "))

result = hours * 60 + mins

print("Result: "+str(result)+" minutes")

Explanation:

This line prompts user for hours

hours = int(input("Hours: "))

This line prompts user for minutes

mins = int(input("Minutes: "))

This line calculates the required output

result = hours * 60 + mins

This line prints the required output in minutes

print("Result: "+str(result)+" minutes")

4 0
3 years ago
Technologies that allow for instant worldwide communication include satellite and computer systems. mobile phones and internet a
maw [93]

Technologies that allow for instant worldwide communication include mobile phones and internet access. Cell phones , wireless devices  and smart phones are technologies that have made global communication instant and more effective.

The internet and the development of digital technology (computer-based technology) in particular, have made the most significant impact on globalization.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • . Briefly describe an SQL DML statement for changing existing data in a table.
    5·1 answer
  • The most basic software required for an online course where writing is involved is:
    13·1 answer
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
    6·1 answer
  • Each web site contains a(n) ____ page, which is the first document users see when they access the site.
    9·1 answer
  • Define a class called Counter. An object of this class is used to count things so it records a count that is a non-negative whol
    12·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!