1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
10

Which media device uses the characteristic continuous?

Computers and Technology
1 answer:
notka56 [123]3 years ago
4 0
The media device that uses characteristics continuous is the Screen.
In Continous characteristic 
is where there is timing relationship between source and destination.
You might be interested in
PLEASEEEEEE HELP, ILL DO ANYTHING JUST ANSWER THESE CORRECTLY!!!!!TYSM!!!
REY [17]

10 minutes

Daguerreotype

Connect the cable between them

Shutters

A digital camera

Chemicals

Joseph Niepce

White

Copper

Camera Lenses

False

True

True

True

False

Thank you for taking photography class, I am doing the same class (FLVS SQUAD!!)

3 0
3 years ago
Read 2 more answers
what are the three parts to physical security standards for various types of army equipment and the risk level
zzz [600]

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

<h3>Further explanation</h3>

Physical security is the part of security concerned with physical measures designed to protect the assets and facilities of the organization.  

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

Access control is a security technique in which regulates who/what can view/use resources in a computing environment. The example of physical access control is the locks, badge system, and security guard.

Surveillance is the condition in which the architects seek to build spaces that are more open to security personnel and authorized users. It is also the continuous monitoring of, for example, the disease occurrence. The example of surveillance is Closed-circuit television cameras (CCTV) placed in the streets.

Security testing is the evaluation and testing the information security of hardware, software, networks, and IT environment. Error handling and specific risky functionalities are examples of security testing

<h3>Learn more</h3>

1. Learn more about the security practice in electronic banking brainly.com/question/7668763

 

<h3>Answer details</h3>

Grade:  9

Subject: Computers and Technology

Chapter:  Physical security standards

Keywords:  physical security, access control, surveillance, security testing

3 0
3 years ago
An outdoor products company wants to test a new website design where customers can get information about their favorite outdoor
ExtremeBDS [4]

Answer:

Option (A) is the right answer for factors.

Option (B) is the right answer for factor levels.

Explanation:

As per the scenario, the company wants to see the effect of their new website design on their customers, for which the factor of time spent on the new website is right because it gives the company to acknowledge the data of time spent by a customer on the new website.

To reach the result of the factor, we have to work on the factor level, in which we will compare the time spent on the old website and the new website because it gives the company an idea of customers preferring which website design.

8 0
3 years ago
with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
AleksandrR [38]

Explanation:

just want points tbh but have a good day

7 0
3 years ago
The fastest way to get help is to type a word or two in the search box.
Elanso [62]
The fastest way to get help is to type a word or two in the search box. TRUE.
5 0
4 years ago
Other questions:
  • After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​
    6·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • “You have been blocked”
    5·2 answers
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    12·1 answer
  • You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
    12·1 answer
  • What is VLSI stand for​
    14·1 answer
  • Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
    6·1 answer
  • In Super Mario 64, a character called Lakitu follows Mario around on a cloud, filming him with a camera as though he were shooti
    8·2 answers
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
  • Write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision Additional No
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!