1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
5

What can geographers map with remotely sensed data?

Computers and Technology
1 answer:
horsena [70]3 years ago
7 0
Geographers can map for example the topography of the earth's surface using aerial photographs taken from a plane flying on regular flight paths at known altitudes. A topographic map with regular contour intervals and also showing infrastructure like roads and buildings can be created from this. Also, the LIDAR system can show features not observable on the ground by 'seeing' into the subsurface and detecting buried escarpments, trenches etc. 
You might be interested in
Why are the READ and DATA statements used<br>together?​
3241004551 [841]

Explanation:

DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.

4 0
3 years ago
What is the formula equivalent to the function =SUM(B1:B5)? A. =B1+B5 B. =$B$1+$B$5 C. =B1+B2+B3+B4+B5 D. =$B$1+$B$2+$B$3+$B$4+$
Contact [7]

Given the options, I would choose Option C. =B1+B2+B3+B4+B5.

5 0
4 years ago
2) What are two reasons we analyze algorithms?
Likurg_2 [28]
It’s a making sections about what algorithms to use
8 0
3 years ago
Read 2 more answers
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
As a member of the accounting group,
Anastasy [175]

Answer:

rtg

Explanation:

rth

3 0
4 years ago
Other questions:
  • Which of the following option is correct about HCatalog?
    14·1 answer
  • Which occupation requires certification by the state?
    15·2 answers
  • Which is an example of static web page??
    9·2 answers
  • HELP ASAP
    9·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    6·1 answer
  • Which technique is best suited to create technical drawings?
    10·1 answer
  • Ranboo back story? (not homework i just wanna find some ppl who are interested in the same things) ft. the reddie meme
    9·2 answers
  • Dr. Wayne is trying to developing techniques to cure Parkinson’s disease by inserting genetic material into patients’ cells to c
    12·1 answer
  • How do we produce quality work in editing audio?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!