1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
12

The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early

sailors.
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
3 0

Answer:

The answer is "Egyptians"

Explanation:

To support the process of development, the Egyptians created and used several easy engines, including the runway and lever. The rope trusses have been used to improve the ships ' beam.

  • In this, the Method of Finite Element was developed to produce square root, reproductive and trigonometric tables for early navigators.
  • Energy-produced and shipped throughout the Mediterranean basin were Egyptian paper, papyrus, pottery, and other products.
You might be interested in
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Christine would like to add something to her document that will illustrate the text. She should _____.
Arisa [49]
Idk? help me out its brayson 
8 0
3 years ago
Read 2 more answers
Why are open standards important in the data communications industry?
IrinaK [193]

They enable interoperability between software and hardware from different vendors.

5 0
3 years ago
The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
ad-work [718]

Answer:

Yes, this statement is completely true

Explanation:

Yes, this statement is completely true. A personal computer is a multimedia machine and can be used to complete an incredibly large number of tasks with ease. Such tasks include all of the ones listed in the question. Aside from that other tasks depend more on the skill level and understanding of the user. For example, an individual who has a vast understanding of technology and programming can create software to perform absolutely any task they may want or need to do.

5 0
3 years ago
Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
Svetllana [295]

Answer:

Big Oh notation is used to asymptotically bound the growth of running time above and below the constant factor.

Big Oh notation is used to describe time complexity, execution time of an algorithm.

Big Oh describes the worst case to describe time complexity.

For the equation; T(N) = 10000*N + 0.00001*N^3.

To calculate first of all discard all th constants.

And therefore; worst case is the O(N^3).

7 0
4 years ago
Other questions:
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • An example of a historical challenge of STAMIS is
    13·2 answers
  • To pinpoint an earthquake's location, scientists need information from how many seismometers?
    8·1 answer
  • Which best describes the Help feature of Word?
    13·2 answers
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Three batch jobs, A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6,
    6·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • The internet's data gathways rely on what kind of hardware devies to route data to its destination?
    14·1 answer
  • have a folder on your Windows computer that you would like to share with members of your development team. Users should be able
    9·1 answer
  • Assume that you have implemented a sequence class. Describe the mySequence object (i.e., items with the correct order and the po
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!