1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
13

What is the term for the process of gathering information through images taken at a distance?

Computers and Technology
1 answer:
ollegr [7]3 years ago
4 0
The choices can be found elsewhere and as follows: 

A. Global positioning 
<span>B. Cartography </span>
<span>C. Topography </span>
<span>D. Remote sensing
</span>
I think the correct answer is option D. The <span>term for the process of gathering information through images taken at a distance would be remote sensing.</span>
You might be interested in
What is the definition of overflow in binary?
asambeis [7]
Overflow occurs when the magnitude of a number exceeds the range allowed by the size of the bit field. The sum of two identically-signed numbers may very well exceed the range of the bit field of those two numbers, and so in this case overflow is a possibility.
4 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
inessss [21]
<h2>Answer:</h2><h2>Releases a new video of its new high - tech manufacturing facility; To create a customer alert about a new program. </h2>

<h2>2)Hosts an online sweepstakes. .....;To increase brand loyalty </h2>

<h2>3)Gives bloggers.....:To give customers a peek into its operation.</h2>

<h2>4)Asks customers to determine their. .....;To allow customers to be part of the product development. </h2>

8 0
3 years ago
"You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
SSSSS [86.1K]

Answer:

6 hosts can have IP addresses on the LAN attached to the router interface

Explanation:

Given IP address

=> 192.168.192.10/29

It has a subnet mask of /29 which means it has 3 host bits. This is calculated by subtracting 29 from 32(number of bits in an IPV4)

Since there are 3 host bits,  the total number of possible addresses is given by

=> 2^{3} = 8 possible addresses.

Out of these 8 possible addresses, the first address will be the subnet id and the last address will be the broadcast address.

Therefore, there are only 6 addresses available for the hosts.

<em>Hope this helps!</em>

5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
____ ensures that the network does not become saturated at any one poin
Tcecarenko [31]
The answer is a network layer. It prevents saturation since it manages and distributes data. It serves as a control to all other networks that receives data. The main function is to create, end or reserve connections by identifying and recognizing IP addresses of connected networks.  
5 0
3 years ago
Other questions:
  • A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
    12·1 answer
  • A car with a 20-gallon gas tank averages 23.5 miles per gallon when driven in town and 28.9 miles per gallon when driven on the
    9·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • Select the guidelines you should follow when creating a resume
    12·2 answers
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
    10·1 answer
  • Which threading model is best for achieving true parallelism and how?
    8·1 answer
  • What is the work of the cpu as processer
    6·2 answers
  • Complete the add repair method!<br> (Will give the brainiest)
    11·1 answer
  • HELPPPP KOKICHI IS OUT TO KILL ME
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!