1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
8

Describe the connection between computer science and travel.

Computers and Technology
1 answer:
Blababa [14]3 years ago
5 0
I tried to research but this is all I got I hope this helps in a way

You might be interested in
Sample answers of What assets were targeted Stuxnet and the team behind the worm?
Damm [24]
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
8 0
4 years ago
Was the type writer the first part of the keyboard? ​
hoa [83]

Answer:

no because of the fact that there were clickers

Explanation:

the key board came out after the clicker

8 0
4 years ago
Alex is writing a feasibility report for his co-workers in the finance department. They are eager to see if the idea they have b
jonny [76]

Alex can use a less formal style, does not have to explain the background in detail, and should get to the point quickly.

6 0
3 years ago
Read 2 more answers
Identity management programs often implement a _________system that facilitates the management of user accounts.
Trava [24]

Answer:

single sign-on

Explanation:

Identity management programs in computer operation involve an administrative process that is carried out by implementing a SINGLE SIGN-ON system that facilitates the management of user accounts.

The purpose is to identify, validate, and approve an individual or group of people to have permission to various applications, computer systems, or networks by linking user rights and limitations with created identities.

Hence, in this case, the correct answer is SINGLE SIGN-ON

6 0
4 years ago
Write one for loop to print out each element of the list several things. then write another for loop
Kay [80]

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

6 0
3 years ago
Other questions:
  • After applying transitions to his presentation, Omar uses the Slide Show feature to view the them. He notices that the transitio
    9·2 answers
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • Almost all PCs have this type of serial connector
    8·1 answer
  • What is the size of a typical business card?
    11·2 answers
  • What is malware short for?
    13·2 answers
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • Given the 8-bit binary code 10011011, what is the equivalent decimal value?
    5·1 answer
  • I need help picture above
    14·2 answers
  • Can some help me on this"..... / ..--- ..--- / ..... / .---- ---.. / .---- ----. / ..... / ..... / .---- ....- / ..--- ----- / .
    6·1 answer
  • Select the best answer from the drop-down menu. Sometimes people feel threatened by new ideas and different ways of doing things
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!