1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
8

Which of the following is true concerning science?

Computers and Technology
1 answer:
topjm [15]3 years ago
6 0
A is your answer to this question

You might be interested in
What is a graphical representation of a real person in a virtual community called?
Hitman42 [59]
A graphical representation of a real person in a virtual community is an avatar.
8 0
3 years ago
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
4 years ago
How to be professional in graphic design without CAD?
Mama L [17]

Answer:

There are two types of image processing software, raster-based, and vector-based. The CAD and the CAID are just the two vectors based software. However, there is much other software like Adobe Illustrator, Microsoft Publisher, Corel Draw, Photoshop on which you can embark upon, and become an equally good Graphics designer. And hence, you can certainly become a Graphics designer with the CAD experience, however, you should keep in mind that all the great Graphic designers use CAD and CAID. And hence, you should use it sometimes certainly in the future.

Explanation:

Please check the answer section.

4 0
3 years ago
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, an
tia_tia [17]

The pseudocode of the program serves as a prototype of the program

<h3>How to determine the pseudocode?</h3>

The pseudocode of the program is as follows:

  1. Start
  2. Declare array MARKS
  3. Input MARKS[0] to MARKS[9]
  4. Sort MARKS
  5. Print MARKS[9] ----- this prints the highest mark
  6. Print MARKS[0] ----- this prints the least mark
  7. FOR I = 0 TO 9; ADD MARK[I] TO TOTAL
  8. Print TOTAL
  9. Print TOTAL/10
  10. Stop

The above pseudocode gets input for the array; then sorts the array before performing the required operations

Read more about pseudocodes at:

brainly.com/question/24735155

4 0
2 years ago
Other questions:
  • Users of an extranet can access a company or organization’s entire intranet
    8·2 answers
  • Write a program that defines an interface having the following methods: addition, subtraction, multiplication, and division. Cre
    8·1 answer
  • Define a Python function named file_listers with two parameters. The first parameter will be a string specifying the name of the
    7·1 answer
  • Write a Java class called getName that prompts a user for their name and then displays "Hello, [name here]!" The flow should loo
    14·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • Write a program that reads from a file called dictionary.txt which contains pairs of English and translated words separated by a
    12·1 answer
  • What is thought to have caused the extinction of the dinosaurs?
    13·1 answer
  • When workers use techology to work from home or an office center, they are
    7·2 answers
  • Answer Please
    12·2 answers
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!