1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
8

Is Bob Lazar telling a lie/withholding information?

Computers and Technology
1 answer:
Anon25 [30]3 years ago
6 0

Answer:

I think he may be a nut, but I'm not sure, there's little evidence of what he says to be true.

You might be interested in
You have used loops for repetitive processes.
zzz [600]

Answer:

for

Explanation:

because:

  • IF = conditional
  • WHILE = conditional
  • DO = isn't a loop function
5 0
3 years ago
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
4 years ago
in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
Colt1911 [192]

in the <u>star</u> topology configuration, hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

Define topology.

When a geometric object <u>is stretched, twisted, crumpled, or bent without closing or opening holes, ripping, gluing, or passing through itself, certain features are kept</u>. This is known as topology in mathematics.

<u>The study of datasets using </u><u>topological </u><u>methods</u> is known as topological-based data analysis (TDA) in applied mathematics. <u>Open sets are a convenient way to define the basic </u><u>topological </u><u>notions of continuity, compactness, and connectedness</u>.

To learn more about topology, use the link given
brainly.com/question/14560531
#SPJ4

3 0
1 year ago
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
k0ka [10]

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

8 0
2 years ago
What is a stored​ procedure?
pshichka [43]

Answer:

The right answer is Letter B. It is an area of memory that is used for dynamic memory allocation.

Explanation:

<em>Because a store procedure is not a computer program,neither a computer software . It is a type of code or subroutine available to applications that access a relational database management system. Such procedures are stored in the database data dictionary. It serves to save time and memory, extensive  or complex processing that requires execution of several SQL. </em>

6 0
3 years ago
Other questions:
  • Write a short program that allows the user to input a positive integer and then
    5·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • What is the purpose of OPPA<br>​
    13·1 answer
  • How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
    15·1 answer
  • Does the estimate of a tolerance level of 68.26% of all patient waiting times provide evidence that at least two-thirds of all p
    13·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • Function of dobji dzong​
    14·1 answer
  • What is sampling?
    6·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!