1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
4 years ago
14

Describe an example of an assignment that could be used in science, technology, engineering, or mathematics that would allow a s

tudent to apply a concept he or she has learned.
Computers and Technology
2 answers:
vaieri [72.5K]4 years ago
8 0

Answer:

Are there choices?

Explanation:

Romashka-Z-Leto [24]4 years ago
7 0

Answer

Landing Pod

Explanation:

In School (science) Multiple kids have made a physical landing pod. bringing that up later in a higher grade can be impressive to any science teacher who may like it. But only make it better as an example for an assignment.

You might be interested in
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Find the errors<br><br> Look to the following code and fix the errors
ivanzaharov [21]
Upper case and lower case problem
7 0
3 years ago
In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
rusak2 [61]

Answer: a function or procedure call from one object to another object

Explanation: UML(Unified Modeling language) behavioral modeling is the depiction of the relation of the elements in a dynamic manner and the dependency on time .Message in the UML behavioral modeling is a functional call taking place from one element to another.

The interaction is the model is seen through the flow of messages.Other options are incorrect because message is not information holding data structure, does not display the relation between object rather presents the flow and is not a memory location .

7 0
3 years ago
Split the worksheet into panes at cell G1.
nikdorinn [45]

Answer:

1. Select below the row where you want the split, or the column to the right of where you want the split.

2. On the View tab, in the Window group, click Split.

Explanation:

3 0
3 years ago
A wireless access point is most like which other network device, in that all computers send signals through it to communicate wi
scZoUnD [109]

Answer:

Hub is the correct answer for the above question.

Explanation:

  • The hub is a network hardware device which can connect more computer with the network.
  • It has a multi-point which is used to connect multiple systems with the network or internet to share the information among them.
  • When any computer which is connected through this needs to communicate with the other computers on a network then it needs to send the signals to this device first then this device sends the signal to the other device.
  • The above question ask about that device which is used to connect the computer and send the signals to communicate which is a HUB which is described above.
3 0
4 years ago
Other questions:
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Create a script that will find the sum of the all multiples of 3 between 1 and 1000 by using For Loop. (Pseudo Code required) 3.
    7·1 answer
  • Mark of athena ar answers
    6·1 answer
  • To properly insert a memory module, you must locate the direction of the ______ .
    14·1 answer
  • a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
    12·1 answer
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    5·2 answers
  • How are status reports useful
    6·1 answer
  • If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic
    14·1 answer
  • An international pharmaceutical company is fully compliant with local and international regulations. However, they suffered a ma
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!