1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
9

"Jointness" and the use of joint forces are underlying themes of the DoD's National Defense Strategy. Which of the following is

not a characteristic of a joint force?
a. Fully integrated
b. Adaptable
c. Highly centralized
d. Networked
Computers and Technology
1 answer:
noname [10]3 years ago
6 0

Answer:

The correct answer is letter "C": Highly centralized.

Explanation:

Jointness is a strategy of the Department of Defense (<em>DoD</em>) in the attempt of combining efforts between the U.S. Military Forces in all stages of operations. With this approach, the Army, Navy, and Air Forces would share resources to help each other while each body would keep its own management.

You might be interested in
______involves encoding information using fewer bits than the original representation Group of answer choices
stepan [7]

Answer:

The answer is "Data compression".

Explanation:

In the given question some information is missing, that is the option of the question, which can be described as follows:  

a) Data mining.

b) Information theory.

c) Data compression.

d) Image reconstruction.

Data compression is the mechanism, in which the bits arranges the data, that is changed. It encodes data, which needs less space is on the drive. It reduces the information instances and storage capacity, and other choices were wrong, which can be described as follows:

  • In option a, Data mining is used in row data searching, that's why it's not correct.
  • In option b, Information theory is used in communication, that's why it is wrong.
  • In option d, Image reconstruction is used in 3D design, that's why it is wrong.
5 0
3 years ago
In order to do a binary search on an array Group of answer choices you must first do a sequential search to be sure the element
Arisa [49]

Answer:

the array must first be sorted.

Explanation:

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

5 0
3 years ago
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
What is a custom information field that helps users to find a specific document?
gtnhenbr [62]
Go to start then type the name of the document or file
6 0
4 years ago
The file extension of MS-Word document in office 2007 is?(a) .pdf (b) .doc (c) .docx (d) .txt
serious [3.7K]
It is usually .doc but if you use notepad, (the free version of Word) it's .docx
5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the main purpose of broadcasting via satellite? A. To enable signal reception at night B. To convert analog signals to d
    5·1 answer
  • Jeff needs to apply a theme and change the font of the theme in the presentation that he is making. Put the steps in the order t
    14·1 answer
  • PLEASE HELPP!! WILL MARK BRAINLIEST!!~~~~~
    11·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • What are the benefits of e learning​
    9·1 answer
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.
    9·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!