1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
11

What is a difference between a waxing crescent and a waning gibbous? (1 point) waxing crescent: first quarter waning gibbous: th

ird quarter waxing crescent: second quarter waning gibbous: third quarter waxing crescent: third quarter waning gibbous: first quarter waxing crescent: fourth quarter waning gibbous: first quarter
Computers and Technology
1 answer:
iren2701 [21]3 years ago
5 0

Answer:

  waxing crescent: first quarter waning gibbous: third quarter

Explanation:

The moon is waxing (getting larger) in the first quarter after the new moon. It is waning (getting smaller) in the third quarter, after the full moon at the end of the second quarter.

The shape of the moon is a "crescent" when it is less than a semicircle. It is "gibbous" when it is more than a semicircle. As it waxes, the crescent grows until the moon is half-full at the end of the first quarter, then it is a waxing gibbous moon through the second quarter until it is full at the end of the quarter. Following the full moon, it is waning gibbous until it becomes half-full again at the end of the third quarter. Finally, it is a waning crescent through the fourth quarter until the new moon.

  waxing crescent: first quarter waning gibbous: third quarter

You might be interested in
All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
Ahat [919]

Answer:

The correct answer is letter "D": Monte Carlo simulations do not consider risks.

Explanation:

The Monte Carlo analysis is a risk management study that allows identifying different outcomes and possibilities of carrying out a project. It is useful at the moment of determining the project costs and the estimated time it will take to complete the plan. Besides, the Monte Carlo analysis uses quantitative data to compute its calculations which ensures to provide more accurate information and minimizes ambiguity in project schedules and costs.

5 0
4 years ago
Which process best describes how you might prepare to apply for a job?
saveliy_v [14]
Take an online course,or maybe do special trainings,practice and study.
8 0
4 years ago
Read 2 more answers
Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
dedylja [7]

To put it briefly, a byte is equivalent to a <em>character</em> in that it encodes a single character, being this in the form of a<u> letter, number, or symbol.</u>

A byte is the smallest unit of storage memory on any modern computer. This byte is commonly made up of<u> eight bits</u>, a combination of binary digits used to represent data. The hierarchy of computer memory is as follows:

  • 1 byte
  • 1 kilobyte
  • 1 megabyte
  • 1 gigabyte
  • 1 terabyte

The statement "<em>A byte is equivalent to a character</em>" is quite literal in its meaning given that through the use of the bits that comprise it, a byte is used to represent and store the data for a single character of text, being that a <u>letter, number or at times a symbol.</u>

<u />

To learn more:

brainly.com/question/13188094?referrer=searchResults

3 0
3 years ago
What is software ownership
kipiarov [429]
Software ownership is a common talking point within organisations. Who owns the license, or who has taken responsibility for ownership.
8 0
3 years ago
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Kipish [7]

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

5 0
3 years ago
Other questions:
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ^ to a cha
    7·1 answer
  • We have two processors. They are named PL and PS. PL has a large number of registers, and PS has a small number of registers. Th
    7·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Write an expression that computes the average of the values 12 and 40.
    6·1 answer
  • You create a formula in A8 that adds up the numbers listed in A1 through A7. You copy the formula and paste it into C8. What hap
    9·1 answer
  • Which windows 10 edition can a device with windows 8 or 8.1 pro upgrade to
    5·1 answer
  • The video game machines at your local arcade output coupons depending upon how well you play the game. You can redeem 10 coupons
    14·1 answer
  • What are three key characteristics of an OS process?
    11·1 answer
  • We initialize the parameters to all zero values and run the linear perceptron algorithm through these points in a particular ord
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!