1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
4 years ago
13

Continuous data

Computers and Technology
1 answer:
Elena-2011 [213]4 years ago
7 0

Answer: Could be subdivided into smaller and smaller units.

Explanation:

 The continuous data are basically measured in the small units and can be easily subdivided into smaller parts without changing their actual meaning.

The continuous data also contain numeric value and can be divided into smaller and finer meaningful parts.

The continuous data can be measured according to the precision of the system. The size and volume are the example of the continuous data.

You might be interested in
An I/O-bound process ___________________________________________________ Select one: a. does not need CPU time b. spends less of
DiKsa [7]

Answer:

Spends more of its time seeking I/O operations than doing computational work.

Explanation:

The I/O bound process are depend on Input and output speed. on the other hand computational work is associated with CPU bound processes. Therefore option "C" is better option for I/O bound processes.

8 0
3 years ago
Objective measures of the user support or help desk operation are called _____.
gizmo_the_mogwai [7]
The answer is "<span>performance statistics"......</span>
5 0
4 years ago
What do both wireless lans (wlans) and wireless wans (wwans) rely on as the communication medium?
AnnyKZ [126]

Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium.

<h3>What is Radio spectrum?</h3>

The radio spectrum is known to be an aspect of the electromagnetic spectrum that is said to have frequencies from 0 Hz to 3,000 GHz.

Note that Wireless lans (WLANS) and wireless wans (wwans) rely on as the radio frequency spectrum communication medium for their functions.

Learn more about WLANS from

brainly.com/question/26956118

#SPJ12

4 0
2 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
(JAVA PLS)
Elza [17]

import java.util.Scanner;

public class JavaApplication54 {

   public static int appearance(String word, char letter){

       int count = 0;

       for (int i = 0; i < word.length(); i++){

           if (word.charAt(i) == letter){

               count++;

           }

       }

       return count;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Type the message to be shortened");

       String message = scan.nextLine();

       message = message.toLowerCase();

       int volCount = 0, repCount = 0, num = 0;

       char prevC = ' ';

       String vowels = "aeiou";

       String newMessage = "";

       for (int i = 0; i < message.length(); i++){

           char c = message.charAt(i);

           

           if (vowels.indexOf(c) != -1 && prevC == ' '){

               newMessage += c;

           }

           else if (vowels.indexOf(c) == -1 && prevC != c){

               newMessage += c;

           }

           else if (vowels.indexOf(c) != -1){

               volCount ++;

           }

           else{

               repCount++;

           }

            prevC = c;

       }

       System.out.println("Algorithm 1");

       System.out.println("Vowels removed: "+volCount);

       System.out.println("Repeats removed: "+repCount);

       System.out.println("Algorithm 1 message: "+newMessage);

       System.out.println("Algorithm 1 characters saved: "+(message.length() - newMessage.length()));

       

       String uniqueMessage = "";

       

       for (int i = 0; i<message.length(); i++){

           char w = message.charAt(i);

           if (uniqueMessage.indexOf(w)== -1 && w!=' '){

               uniqueMessage += appearance(message,w)+""+w;

               num++;

           }

       }

       System.out.println("Algorithm 2");

       System.out.println("Unique characters found: "+num);

       System.out.println("Algorithm 2 message: "+uniqueMessage);

       System.out.println("Algorithm 2 characters saved: "+(message.length() - uniqueMessage.length()));

   }

   

}

I hope this helps!

6 0
3 years ago
Other questions:
  • The first row of a table is often called the _____ row.
    12·2 answers
  • Clicking on this will minimize all open windows.
    5·2 answers
  • Suppose x = 10 and y = 20. The value of the expression
    11·1 answer
  • What types of storage can be used to access your data on another computer?
    6·2 answers
  • F=M×A<br> What is the acceleration of 50kg object pushed with a force of 500 newton?
    14·1 answer
  • This folder is ndownload and it isn't like download file
    14·1 answer
  • Write 2-3 lines about the Basic operations of computer
    5·1 answer
  • What is virtual office?
    11·1 answer
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
  • The UIDs for a set of hierarchical entities can be propagated through multiple ________ relationship
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!