1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
14

What two skills are most important for a meteorologist

Computers and Technology
2 answers:
Komok [63]3 years ago
7 0

being able to find out the weather.


being able to wear fancy suits.

NeX [460]3 years ago
4 0

ability to create charts and critical thinking

You might be interested in
A single instruction carried out by a computer is called a what?
pochemuha

Answer:

in computer science, an instruction is a single operation of a processor defined by the instruction set

Explanation:

if you need anymore help let me know :)

6 0
3 years ago
Does anyone know how to remove specific columns of data sets in R studio?
timofeeve [1]

Answer:The most easiest way to drop columns is by using subset() function.

Explanation:

In the code below, we are telling R to drop variables x and z. The '-' sign indicates dropping variables. Make sure the variable names would NOT be specified in quotes when using subset() function.

5 0
3 years ago
Use the_____icon to insert a new record.<br><br> A. *<br> B. X<br> C. =<br> D. &amp;
morpeh [17]

Answer:

i think the answer is point C

8 0
3 years ago
A web page contains several links. what is a link?
nataly862011 [7]
A connection to another source, usually a website
3 0
4 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
4 years ago
Other questions:
  • Effective character encoding requires:
    8·1 answer
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    13·1 answer
  • What pattern is a heart-shaped pattern that captures sound from a single direction, ?from the front?
    5·1 answer
  • Which chart element provides the boundaries of the graphic?
    9·1 answer
  • Write and application that reads five integers from the user and determines and prints the largest and the smallest integers. Us
    7·1 answer
  • Histogram 9AMAA 12/01/2021.
    9·1 answer
  • In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
    7·2 answers
  • From Edmentum/Plato
    10·1 answer
  • What is the objective of Accenture‘s e-stewards program
    5·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!