1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
10

Data is best described as

Computers and Technology
2 answers:
Rudiy273 years ago
8 0

Answer:

A

The answer is D I did this

Just learned this in school

Explanation:

a or d

Lunna [17]3 years ago
7 0

Answer:

it is B i just got it corect

Explanation:

You might be interested in
Which one of the following statements referring to mobile Internet
zhenek [66]

Answer: All are true

Explanation:

6 0
4 years ago
Read 2 more answers
_______ is a very common approach to multisystem authorization.
mart [117]

Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.

Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.

Learn more about password here-

brainly.com/question/14580131

#SPJ4

7 0
1 year ago
Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
Ganezh [65]

Answer:

The correct answer to the following question will be "Adaptive Optics".

Explanation:

  • AO (Adaptive Optics) is a technique used to enhance optical system performance by reducing the impact of incoming gravitational wave distortions by compressing a mirror to compensate for the distortion.
  • It operates by calculating and compensating for defects in a wave-front with a system that corrects these errors as a deformable mirror or even a liquid crystal collection.
  • It is a technique that can make it possible for a single ground-based telescope to get images as clear as that of the Hubble Space Telescope.
  • Certain methods can achieve power resolution that exceeds the limit set by atmospheric distortion, for example, Aperture synthesis, Lucky imaging, and Speckle imaging.

Therefore, Adaptive Optics is the right answer.

7 0
4 years ago
Letter diagrams are least useful for showing:
ser-zykov [4K]
The answer is c .....
4 0
3 years ago
Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?
mamaluj [8]
<span>Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?
Ryze
Friendster
SixDegrees
Tribe.net
MySpace


The Correct answer is </span>Friendster.
5 0
4 years ago
Other questions:
  • A spreadsheet is a software program for storing, managing, and retrieving information. true or false?
    15·2 answers
  • On the Design tab, which group allows you to select a different data set for a chart?
    7·2 answers
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Which tab should you choose to add a picture from a file to your presentation?
    8·1 answer
  • Program code that can be evaluated to a value is called a(n):__________
    12·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
    6·1 answer
  • Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propaga
    15·1 answer
  • One security component that doubles as a network component
    5·2 answers
  • Consumers affect which goods and services are produced because they _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!