1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
4 years ago
5

Size of a MAN can range from ​

Computers and Technology
1 answer:
Dovator [93]4 years ago
6 0

Answer:

According to the latest CDC stats, these are the average heights for U.S. adult men based on age:

Ages 20 to 39: 176.1 centimeters

Ages 40 to 59: 175.8 centimeters

Age 60 and older: 173.4 centimeters

You might be interested in
Which color is considerd to be a cool color?
scZoUnD [109]
It depends on personal tastes and what it's applied on.

For example: I like Blue. I think Blue is cool! But, I also think red is cool, on a sports car. I think it would have to be Red, but thats what I think. The same with orange. Green for a T-Shirt is cool as well!

Remember that if you want to find out what color someone likes, just ask them. Generally though, Red is considered to be cool for most things.
8 0
3 years ago
Read 2 more answers
which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs o
sasho [114]

Answer:

hypervisor

Explanation:

becauseis a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on.

8 0
3 years ago
Explain why database management systems are used in hospitals? Discuss
Sergeeva-Olga [200]

The reason why database management systems are used in hospitals is because the use of Healthcare databases aids in terms of diagnosis and treatment, handle documentation and billing, and others.

<h3>What is a database management system in healthcare?</h3>

A database management system (DBMS) is known to be a type of software that has been developed to help people to form and keep databases.

It is one that helps to lower the risk of errors associated with medical operations and management. It reduces  paperwork and staff and also improves  performance.

Learn more about database management from

brainly.com/question/24027204

8 0
2 years ago
Which of the following expressions evaluates to false?
lesantik [10]

<u>Answer:</u>

<em>If we analyze the given piece of code, C1, C2, C3 and C4 are 4 classes. </em>

  • C1 is the base class and does not derive from any other class.
  • C2 is a class which inherits C1.
  • C3 is a class which inherits C2 and indirectly inherits from C1.
  • C4 is a class which inherits C1 directly. If analyses the instance creation statement,

<em>c1 instance of C1 is valid because the object is created for class C1.</em>

<em>c1 c2 = new C2() is valid once again the object is created for Class C2</em>

<em>c1 c3 = new C3() is invalid because the class C3 directly inherits from C2 and not from C1</em>

<em>c1 c4 = new C4() is valid</em>

5 0
3 years ago
Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, I
Ket [755]

Answer:

Fingerprinting Organizations with Collected Archives (FOCA)

Explanation:

FOCA (Fingerprinting Organizations with Collected Archives) was released in 2009 and is a great web manipulating tool used for many functions such as extracting metadata information of and documents on a website.

FOCA has the capability of extracting even hidden information from any document (such as Microsoft office and PDF files) which are scanned by it (FOCA). Information such as website creator's network login, e-mail addresses, IP addresses  and other information.

The metadata extracted could then be used for several purposes such as cracking of passwords.

5 0
3 years ago
Read 2 more answers
Other questions:
  • In what cases would you denormalize tables in your database?
    8·1 answer
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
    12·1 answer
  • What method of heat transfer is used when the sun heats the earth?
    14·1 answer
  • To connect several computers together, one generally needs to be running a(n) ____ operating system
    12·1 answer
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
    13·2 answers
  • What is 54663266326-737237232732773
    5·1 answer
  • 3. Output the following:<br>a.<br>21%4​
    12·1 answer
  • What is output unit of a computer system?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!