1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
3 years ago
13

Name an analog quantity other than temperature and sound

Computers and Technology
1 answer:
liq [111]3 years ago
6 0
I know that this might be wrong but is it light?
You might be interested in
Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
Umnica [9.8K]
Point, line, or bar graph is what he would use

6 0
3 years ago
Read 2 more answers
During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
Firlakuza [10]

Answer:

The answer is "physical design"

Explanation:

This design is the method of translating the specification of circuits into a physical design that explains how cells and roads connect. It is an architecture, that involves the system's internal processes of input and output.

  • This system is created by establishing the design criteria, which determines basically what the applicant system is doing.  
  • It includes the architecture, process architecture and software design of user interfaces.
6 0
3 years ago
What is a banner grab?
alexira [117]
Banner Grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.

Hope you find this helpful!
Brainliest and a like is much appreciated!
3 0
2 years ago
__________ can collect information about credit card numbers.
saveliy_v [14]

Answer:

<h3><u>Spyware</u></h3>

  • Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses. Adware displays pop-up advertisements when you are online.

Explanation:

<h2>Hope this helps !! </h2>
5 0
2 years ago
Read 2 more answers
Interpret the Department of Homeland Security’s mission, operations and responsibilities.
Shalnov [3]

Answer:

 The department of homeland security mission is to provide the efficient and good security system to the nation in all the aspects against the terrorism.

The main aim of the department of homeland security mission is to anticipate fear based oppressor assaults inside the United States, decrease the weakness of the United States to psychological oppression, and limit the harm, and aid the recuperation from psychological oppressor assaults that do happen in the United States.

The main responsibility of this department is that:

  • Providing the security against the threats of terrorism attacks
  • Providing the effective and quick recovery from the disaster
  • Also, give the secured cyber space to the homeland.
7 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • Which three phrases describe a wireframe
    12·1 answer
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Programming assignment (100 pts): In the C++ programming language write a program capable of playing Tic-Tac-Toe against the use
    14·1 answer
  • What is wrong with the following C++ code? How would you fix it? int sum; for (int i=0; i&lt;1000; ++i) sum += i; { printf("Sum
    5·1 answer
  • Setting up a desktop computer for anAutoCADspecialist who needs a minimum of 125 GBram which operating system would be the best
    5·1 answer
  • Give three examples of NON-TRADITIONAL web authoring tools<br> 3 pour
    14·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines. true or false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!