1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
10

An invisible path determining the way of travel from one place to another.

Computers and Technology
1 answer:
WARRIOR [948]3 years ago
3 0

Answer:

i dont really like computors

Explanation:

im not good at it

You might be interested in
I analyze data, as a consultant, for companies making important business decisions. In order to get my point across, which of th
ladessa [460]

Answer:

3

Explanation:

I've just taken the test and made a 100. 3 is the most logical answer aswell, it has more of an effect than the others.

4 0
3 years ago
To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
qwelly [4]

The type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI) is called: LDIF files.

<h3>What is OpenLDAP?</h3>

OpenLDAP can be defined as a free, open-source version of the Lightweight Directory Access Protocol (LDAP) that was developed in 1993 by the OpenLDAP Project.

Basically, it is the server software implementation of the Lightweight Directory Access Protocol (LDAP).

<h3>The uses of OpenLDAP.</h3>
  • It is used for LDAP database control.
  • It allow end users to browse, create, remove and change data on a LDAP server.
  • It allows end users to manage their passwords and browse through data schema.

In conclusion, LDAP Data Interchange Format (LDIF) file is a type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI).

Read more on LDAP here: brainly.com/question/25998402

7 0
2 years ago
PLTW IM Chapter 1.2-1.3 i need this please
Luden [163]

<u>Answer:</u>

<em><u>Biomedical Science</u></em>

<em><u>The application of the principles of the natural sciences, especially biology and physiology to clinical medicine</u></em>

<em><u>Control group</u></em>

<em><u>The group in an experiment where the independent variable being tested is not applied so that it may serve as a standard for comparison against the experimental group where the independent variable is applied.</u></em>

<em><u>Dependent Variable</u></em>

<em><u>The measurable affect, outcome, or response in which the research is interested.</u></em>

<em><u>Experiment</u></em>

<em><u>A research study conducted to determine the effect that one variable has upon another variable</u></em>

<em><u>Forensic Science</u></em>

<em><u>The application of scientific knowledge to questions of civil and criminal law</u></em>

<em><u>Hypothesis</u></em>

<em><u>Clear prediction of anticipated results of an experiment</u></em>

<em><u>Independent Variable</u></em>

<em><u>The variable that is varied or manipulated by the researcher</u></em>

<em><u>Negative control</u></em>

<em><u>Control group where the conditions produce a negative outcome. Negative control groups help identify outside influences which may be present that were not accounted for when the procedure was created</u></em>

<em><u>Personal protective equipment</u></em>

<em><u>Specialized clothing or equipment, worn by an employee for protection against infectious materials.(as defined by OSHA)</u></em>

<em><u>Positive control</u></em>

<em><u>Group expected to have a positive result, allowing the researcher to show that the experiment set up was capable of producing results.</u></em>

<em><u>Adenine</u></em>

<em><u>A component of nucleic acids, energy carrying molecule such as ATP, and certain co enzymes. Chemically it is a purine base.</u></em>

<em><u>Chromosome</u></em>

<em><u>Any of the usually linear bodies in the nucleus that contain genetic material.</u></em>

<em><u>Cytosine</u></em>

<em><u>A component of nucleic acids that carries hereditary information in DNA and RNA in cells . Chemically it is a pyrimidine base.</u></em>

<em><u>Deoroxyribonucleic acid</u></em>

<em><u>A double-stranded helical nucleic acid molecule capable of replicating and determining the inherited structure of a cell proteins</u></em>

<em><u>Gel electrophoresis</u></em>

<em><u>The separation of nucleic acids or proteins, on the basis of their size and electrical charge, by measuring their movement through an electrical field in a gel.</u></em>

<em><u>Gene</u></em>

<em><u>A discrete unit of hereditary information consisting of a specific nucleotide sequence in DNA.( or RNA in some viruses).</u></em>

<em><u>Guanine</u></em>

<em><u>A component of nucleic acids that carries hereditary information in DNA and RNA in cells. Chemically it is a purine base.</u></em>

<em><u>Helix</u></em>

<em><u>Something in spiral form.</u></em>

<em><u>Model</u></em>

<em><u>A simplified version of something complex used, for example, to analyze and solve problems or make predictions.</u></em>

<em><u>Nucleotide</u></em>

<em><u>A building block of DNA, consisting of a 5 carbon sugar convalently bonded to a nitrogenous base and a phosphate group.</u></em>

<em><u>Restriction enzymes</u></em>

<em><u>A degradative enzyme that recognizes specific nucleotide sequences and cuts up DNA</u></em>

<em><u>Restriction fragment length polyphorisms (RFLPs)</u></em>

<em><u>Differences in DNA sequences on homologous chromosomes that can result in different patterns of restriction fragment lengths (DNA segments resulting from treatment with restriction enzymes)</u></em>

<em><u>Thymine</u></em>

<em><u>A component of nucleic acid that carries hereditary information in DNA cells. Chemically, it is a pyrimidine base</u></em>

<em><u>Autopsy</u></em>

<em><u>An examination of the body after death usually with such dissections as will expose the vital organs for determining the cause of death</u></em>

<em><u>Bibliography</u></em>

<em><u>a document showing all the sources used to research information</u></em>

<em><u>Citation</u></em>

<em><u>A written reference to a specific work by a particular author or creator which identifies the document in which the work may be found</u></em>

<em><u>Documentation</u></em>

<em><u>The act of creating citations to identify resources used in writing a work</u></em>

<em><u>Health Insurance Portability and Accountability Act (HIPAA)</u></em>

<em><u>A comprehensive set of standards and practices designed to give patients specific rights regarding their personal health information</u></em>

<em><u>Medical examiner</u></em>

<em><u>A physician who performs an autopsy when death may be accidental or violent. He/she may also serve in some jurisdictions as the coroner.</u></em>

Explanation:

This is what I found when I searched up <u>pltw chapter 1.2-1.3 answers.</u>

I did this because there was not really a question in there.

PS:

I'm sorry if this is too long for you to read.

Give me brainliest, if you want to, that is.

7 0
2 years ago
What is stored in a source file, an object file, and his executable file?
neonofarm [45]
A source file has source code, what a human understands. It isn't compiled or linked.

An object file has compiled, but not linked intermediary code.

An executable file has compiled and linked code which is executable.
6 0
3 years ago
I got a question in computer science I don't understand, can someone please help.​
AnnyKZ [126]

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

6 0
2 years ago
Other questions:
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • When a rectangular region is defined using an appropriate style, which value matches the specified edge of the clipping region t
    7·1 answer
  • When Windows deletes the driver package and driver files, in what situation might it not delete driver files used by the device
    15·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • In 3 to 5 sentences, describe whether or not files should be deleted from your computer. Explain you answer.
    14·2 answers
  • What can you find the under the privacy policy section of a shopping website?
    12·1 answer
  • What does this say in morse code?
    11·2 answers
  • HELP ME PLEASE
    14·1 answer
  • The area that we can see just after windows is started is subject​
    6·1 answer
  • Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!