1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
8

How are natural systems and engineered systems similar to one another?

Computers and Technology
1 answer:
erastovalidia [21]3 years ago
4 0

They get the idea from nature and then the make engineered systems.That is how they are similar.

You might be interested in
In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
Feliz [49]

Answer:

  see below

Explanation:

The program of interest is the function "findMode[x, n]" in the attached. It is written the Wolfram Language of Mathematica.

The basic idea is that the data in the array is sorted. The sorted array is partitioned into sets of identical elements, and the number in each of those sets is counted. The maximum of those counts is the mode. The location of the maximum count corresponds to the location of the set having that count. We use that location information to pull out the mode value(s).

If there is more than one mode, all are reported.

__

An example data array is provided, along with the program output.

6 0
4 years ago
Sharing a workbook helps to complete on time. Multiple people accessing the workbook help to build
BlackZzzverrR [31]
Collaboration skills
7 0
3 years ago
In preparing categorical variables for analysis, it is usually best to a. combine as many categories as possible. b. convert the
Genrish500 [490]

Answer:

In the given question the correct option is missing, which can be described as follows:

"It transforms binary, null variables into the groups."

Explanation:

These variables are real variables, which could also take up a series of variables, that are either constrained or defined. This can be regarded as a listing. It is used to analyze and convert it, into binary in the following ways, and wrong choices can be described as follows:

  • In option a, It can't combine, it only converts.
  • Option b and Option c is wrong because, it can't convert numeric, it only convert binary number to dummy variables.

5 0
3 years ago
You're going to be mowing lawns as a summer job. How long will it take for your
ahrayia [7]
Hshshshhshshs 3. 4 hours
8 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Ymorist [56]

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.

8 0
3 years ago
Other questions:
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • Which of the following is the fastest processor
    9·1 answer
  • View the attached picture
    7·1 answer
  • Which of the following technologies can operate in the 125 kHz to 134 kHz range?
    10·1 answer
  • Define a function compute gas volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the
    7·2 answers
  • What is the best definition of a network?
    14·2 answers
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
  • A multiprocessor with 10 processors has 36 attached tape drives. A number of jobs have been submitted to the system where each j
    8·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!