1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
4 years ago
12

? Assessment

Computers and Technology
1 answer:
Ksivusya [100]4 years ago
4 0

Answer:

Her performance over the course of  a season.

Explanation:

An athlete is signed for a season. These days each aspect of an athlete is noted through the effective use of the best technology. However, for detailed study, one or several plays, and certainly not the second half of a game is enough. It's required to collect the details for a complete season. And that is possible, as an athlete is hired for a season. And through such a detailed data set of a complete season, we can now train a machine as well, and it will let the athlete know where she is going wrong. And thus she can improve and remove those faults from her game, and become a better athlete. And even for a coach, one complete season is required, though when he has not seen her playing before that season. It's assumed that this is her first season. All the options mentioned are good, but the best is certainly the one with complete details, and that is a complete season. The rest is good but not the best.

You might be interested in
Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
vekshin1

Answer:

Vector

Explanation:

vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

8 0
3 years ago
The process of sending and receiving messages without using any spoken words defines _____. A. Verbal communication b. Nonverbal
balandron [24]

The process of Sending & Recieving messages without using any spoken words defines by NON-VERBAL COMMUNICATION

<h3>What is Non -Verbal Communication ?</h3>
  • Nonverbal communication is a way of transfering the information through  body language that includes facial expressions ,eye contact ,gestures organ senses etc.
  • Mainly Open personality , friendliness , smiling when people meet each other , their accepting nature ,kindness .
  • Everyone uses this nonverbal communication whether their languages , personalities,culture,religions are different .

Learn more about Non-verbal Communication here: brainly.com/question/1995115

6 0
3 years ago
What is an acceptable alternative to installing an audible backup alarm?
san4es73 [151]
<span>One alternative is the use of an observer/signal person. Due to the piercing noise that is usually associated with audible back-up alarms and its noise intrusiveness to nearby residents, having an observer who signals to others of oncoming construction equipment will meet the same safety requirement as having an audible backup alarm</span>
5 0
3 years ago
What do you need to do to make the LED light up?
Yanka [14]

Answer:

provide electricity .

Explanation:

The LED light glows when current flows through it .

<em><u>Additional</u></em><em><u> </u></em><em><u>i</u></em><em><u>n</u></em><em><u>f</u></em><em><u>o</u></em><em><u>r</u></em><em><u>m</u></em><em><u>a</u></em><em><u>t</u></em><em><u>i</u></em><em><u>o</u></em><em><u>n</u></em>

  • The full form of LED is light emitting diode .
  • It is a semi conductor .
  • It has many advantages as it uses less amount of current .
6 0
4 years ago
The Bureau of Justice Statistics was able to determine that what % of identity theft victims were unable to determine how their
Iteru [2.4K]

Answer:

68%

Explanation:

Identity theft is a kind of crime that is committed when individuals are impersonated. The person who commits the crime assumes the personality of the victim. This could happen in the case of internet financial crimes where the financial details of individuals are stolen and then used to make unauthorized transactions.

The Bureau of Justice report on identity theft victims in 2014 shows that among the victims of this act only 32% knew how the offender was able to obtain their information. This would mean that 68% of the victims were unable to determine how their information as stolen.

6 0
4 years ago
Other questions:
  • What is a system analyst?
    12·1 answer
  • You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
    10·1 answer
  • How has science fiction influenced technology
    7·2 answers
  • The speed of sound depends on the material the sound is passing through. Below is the approximate speed of sound (in feet per se
    9·1 answer
  • In many DBMSs where no strict separation of levels is maintained, this one language is used by the DBA and database designers to
    13·1 answer
  • Self-confidence, blank, and communication are key factors to building positive relationships. Fill in the blank with a 13 letter
    5·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
  • State four reasons why office automation is adopted in business establishment?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!