1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
4 years ago
11

Each type of text has a purpose for the reader if you were looking to research penguins what type of text would u utilize

Computers and Technology
1 answer:
dlinn [17]4 years ago
3 0
1. ughhhh not entirely sure but B, 2. again not entirely sure should be B as well and finally 3.is D remember these are not always the answer just most likely what one person thinks
You might be interested in
What are the different methods of enhancing/decorating<br> bamboo product​
Zepler [3.9K]

Explanation:

Methods of this technique include glueing, chemical gilding, and electroplating.  Staining is used to color wood to give an illusion of texture. This may come in two varieties.

7 0
3 years ago
Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). Th
Alekssandra [29.7K]

Answer:

Answer is provided in the explanation section

Explanation:

Given data:

Bandwidth of link = 10* 106 bps

Length of packet = 12* 103 bits

Distance of link = 40 * 103m

Transmission Speed = 3 * 108 meters per second  

Formulas:

Transmission Delay = data size / bandwidth = (L /B) second

Propagation Delay = distance/transmission speed = d/s

Solution:

Transmission Delay = (12* 103 bits) / (10* 106 bps) = 0.0012 s = 1.2 millisecond

Propagation Delay = (40 * 103 meters)/ (3 * 108mps) = 0.000133 = 0.13 millisecond

4 0
4 years ago
____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
nikdorinn [45]

Answer:

c. NSTISSI No. 4011

Explanation:

NSTISSI is an acronym for National Security Telecommunications and Information Systems Security Institute.

It is one of the standards set by the Committee on National Security Systems (CNSS), an intergovernmental agency saddled with the responsibility of setting policies for the security of the IT (information technology) security systems of the United States of America.

NSTISSI No. 4011 presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.

Generally, all information technology institutions and telecommunications providers are required by law to obtain a NSTISSI-4011 certification or license because it is a standard for Information Systems Security (INFOSEC) professionals.

8 0
3 years ago
Anyone know a hat in time??
Scrat [10]

Answer:

I just like the main character. (Hat kid)

Explanation:

I just see them like a chill kiddo. I get good vibes from them so yeah

5 0
3 years ago
Which of the following is the most reliable way to check the accuracy of a website?
ELEN [110]

Answer:

Examine the sources cited by the website

Explanation:

Due to the ability for everyone to create a website, and that there are no governing standards on the quality of information given on websites, it is important when conducting research to ensure that the sources on the web are up to date, accurate, and provide an objective view

Therefore, it is important to go through and examine the website critically using the the following criteria

1) The website coverage

2) The currency of the website's information

3) Weather the website is objective or not

4) The identity of the author of the website and the ability to contact the author

5) The accuracy of the information contained in the website

3 0
3 years ago
Other questions:
  • An employee believes there is an imminent danger situation at her workplace. She contacts OSHA to report the safety hazard. Her
    8·1 answer
  • All of the following are qualities of certification programs except:
    8·2 answers
  • Which of the items listed is not considered to be personal protective equipment (PPE)?
    14·1 answer
  • You should always try to avoid showing that an animal in a zoo is a captive animal. True False
    5·1 answer
  • Create a program that receives the age of a user and determine whether he/she can vote or not. Assume the voting age to be 20. C
    14·1 answer
  • (main.c File)
    7·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • Melissa is working on her Cell class by adding new methods. However, in her most recent version, she is receiving errors in some
    14·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
  • Cycle technology implemented a dibs initiative last year for one of the manufacturing sites. however, the initiative is not prog
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!