1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
14

Why did scientists who study weather need more advanced technology? Check all that apply.

Computers and Technology
2 answers:
Ierofanga [76]3 years ago
6 0

Answer:

they are all correct

Explanation:

All options apply to the question because they all need technology for development and improvement. Scientists needed to develop more technologies in order to attend all their necessities, such as anticipating weather changes, forecasting weather previously, predicting weather behaviour in different places and in one specific place, accounting for reasons and natural resources related to weather changes, and much more. Therefore, technology provides faster and more consistent data for all these informations needed, since all technology tools to study weather were developed according to their specific needs.

<h2>Hope this is correct</h2>

kobusy [5.1K]3 years ago
4 0

Answer:

All options are correct.

Explanation:

All options apply to the question because they all need technology for development and improvement. Scientists needed to develop more technologies in order to attend all their necessities, such as anticipating weather changes, forecasting weather previously, predicting weather behaviour in different places and in one specific place, accounting for reasons and natural resources related to weather changes, and much more. Therefore, technology provides faster and more consistent data for all these informations needed, since all technology tools to study weather were developed according to their specific needs.

You might be interested in
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
What task do the referential integrity settings prevent?
Cerrena [4.2K]

Answer:

D

Explanation:

5 0
3 years ago
Read 2 more answers
Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
nexus9112 [7]

Answer:

D. Fault tolerance

Explanation:

  • Fault Tolerance basically refers to the feature or capability of a  system to keeps on working and performing its operations without interruption in case of a failure.
  • This failure can be the failure of one or more of its components.
  • This is beneficial as the system does not stop working or fail completely.
  • It provides copies of the same system or backup components which can be used when the existing system fails and prevents the loss of information and services.
  • Accessibility  refers to provide equal services for everyone who uses a system. So its not a correct option.
  • Moore’s law states that the computing speed and power will double every two years so its not a correct option as well.
  • Anti virus is a software to identify, prevent and remove viruses and malware so it is not a correct option as well.

3 0
3 years ago
Margaret would like to work in the Journalism and Broadcasting industry. Which set of qualifications would best assist Margaret
8_murik_8 [283]
Critical thinking, accuracy and confidence
7 0
3 years ago
Read 2 more answers
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C
Svetllana [295]

Answer:

c.

Explanation:

People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.

8 0
3 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • What Windows Server 2016 feature implements software-defined storage and is intended to make storage more versatile by making it
    11·1 answer
  • What type of analysis should be used to respond to the statement, "Let's cut advertising by $1000 repeatedly so we can see its r
    14·1 answer
  • Audio editing software contains several codecs that allow you to
    15·1 answer
  • In cell G6, use the appropriate lookup and reference function to retrieve the rental rate from the named range RentalRates. The
    15·1 answer
  • Write the header file Stadium.h for a Stadium class. The Stadium class has the following data members: 1) an array of 1000 Seat
    7·1 answer
  • ¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
    6·1 answer
  • NEED HELP ASAP!!!!!!!!!!!
    7·1 answer
  • Edhesive 6.8 lesson practice answers
    10·1 answer
  • Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!