1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
8

Many interesting science-, technology-, engineering-, and math-oriented websites provide open-source data to the public. Which o

f the following sites provide that information?
a. DATA.GOV
b. Whitehouse.gov
c. NYC Open Data
d. National Cancer Institute
e. International Genetics Foundation
f. creditscore.com
g. USPostal Service
Computers and Technology
1 answer:
lara [203]3 years ago
7 0

Answer: a. DATA.GOV

b. Whitehouse.gov

c. NYC Open Data

d. National Cancer Institute

e. International Genetics Foundation

Explanation:

The mentioned websites will provide information about science, engineering, mathematics, and technology. These are open source websites and they can provide information to the public.

creditscore.com  and  US Postal Service these websites the above mentioned information. The former provides the credit report provided by the credit bureau and the other latter is related with the independent agency which provides postal services.

You might be interested in
1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the
NNADVOKAT [17]
The answer is B hope this helps :)
7 0
3 years ago
What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
mart [117]

Answer:

Structured programming also known as Modular programming in which the program is made as a single structure.The execution is instruction by instruction.It mainly focuses on improving the quality,clarity and development time of a computer program.

The top-down approach works by breaking a complex algorithm into smaller parts called modules. The modules keep breaking until there is no space left for breaking them without hindering the originality.The breaking of the modules is prohibited after achieving a certain level of modularity . C language uses this approach.

Bottom up works exactly opposite of how the top-down approach works.This approach works in the most elemental level of solving a problem and going up with combination of several parts of the solution to achieve required results.

4 0
3 years ago
1. JAVA Create one method to do the following expressions. Given the following declarations, what is the result of each of the e
nordsb [41]
<span>public void myMethod(int w, int y, int z) {
</span>int a, b, c, d, e, f, g, h, i, j, k, l;

<span>a = w * z;
</span>b = w * z + y;
c = w * -z;
d = w * --z + y++;
e = w * z-- + ++y<span> ;
</span>f = w + z * y;
g =  w – y + z;
h = (w + y) * z;
i = y / w;
j = y / z;
k = w % y;
<span>l = y % w;
</span>System.out.println( "%d %d %d %d %d %d %d %d %d %d %d %d", a,b,c,d,e,f,g,h,i,j,k);
}

To use 
myMethod(2, 7, 12);
7 0
4 years ago
WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
klio [65]

Answer:

LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.  

Spam occurs:  

1. When you send bulk of connect requests in a short time  

2. When you send irrelevant messages to prospects  

3. When you Perform overactivity  

4. When you use LinkedIn automation tools  

5. When you send spammy and sales-y messages  

All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.

4 0
3 years ago
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
Other questions:
  • Software that helps run the computer's hardware devices and coordinates instructions between applications is called
    10·1 answer
  • There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing
    15·2 answers
  • In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, p
    10·1 answer
  • Write a function in Java that implements the following logic: Given a string and an int n, return a string made of n repetitions
    15·1 answer
  • Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app
    8·2 answers
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • How do news organizations primarily create revenue?
    12·2 answers
  • Explain how the organ systems work together to warm up the body on a cold day
    12·2 answers
  • Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!