1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
13

What is the term for the process of gathering information through images taken at a distance?

Computers and Technology
1 answer:
ollegr [7]3 years ago
4 0
The choices can be found elsewhere and as follows: 

A. Global positioning 
<span>B. Cartography </span>
<span>C. Topography </span>
<span>D. Remote sensing
</span>
I think the correct answer is option D. The <span>term for the process of gathering information through images taken at a distance would be remote sensing.</span>
You might be interested in
Select the correct answer.
Roman55 [17]

Answer:

The answer is procedures I looked it up for ya :)

Explanation:

6 0
4 years ago
Read 2 more answers
Identify an internal user who uses product lifecycle management (plm) software and its data.
Andrej [43]

<u> Quality assurance manager</u> is an internal user who uses product lifecycle management (plm) software and its data.

<h3>What is quality assurance manager?</h3>

The quality assurance manager is accountable for delivering optimum quality of a company's benefits or goods. In addition to maintaining constant quality, they help to ensure keeping with laws, regulations, and environmental standards, recommending improvements where required.

<h3>What is the qualification of a Quality Assurance Manager?</h3>

Quality Assurance Manager Requirements:

Bachelor's degree or associate's with knowledge in the field. Technical proficiency must be able to use computers and generate reports. Capacity to analyze data and create and review processes. Excellent communication skills.

To learn more about quality assurance manager, refer

brainly.com/question/15855298

#SPJ4

Complete question is,

a. Packaging supplier

b. Contract manufacturer

c. Manufacturer's design partner

d. Quality assurance manager

3 0
2 years ago
Create a simple program of your own using a Loop that counts and displays numbers 1-10.
avanturin [10]

Answer:

I think

Explanation:

you....

8 0
3 years ago
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
Describe the five components of a computer
Anna [14]

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

7 0
2 years ago
Other questions:
  • Complete the function ConvertToFeetAndInches to convert totalInches to feet and inches. Return feet and inches using the HeightF
    5·1 answer
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • How can rows be added to a table​
    5·1 answer
  • When purchasing a mobile computer, you should determine the form factor that meets your needs. What is a form factor?
    15·1 answer
  • What is an entity? An attribute?
    13·1 answer
  • Write a program that prompts the user for an integer, then asks the user to enter that many values. Store these values in an arr
    14·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • . What is piracy? ???????????????????​
    5·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of researc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!