1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
15

Why is science, mathematics, and technology different from engineering?

Computers and Technology
1 answer:
oee [108]3 years ago
3 0

Science, mathematics and technology are different because engineering has to do with physical work and you can't get the measuring on a jet or a plane wrong because it could fail in mid air. As for math and science if you fail the test, then you can always re-do it.

You might be interested in
How can you find the square root of 8 using the pow() function
zimovet [89]

import math

print(math.pow(8, 0.5))

You can find the square root of any number by squaring it by 0.5

7 0
2 years ago
Match the description to the step in troubleshooting.
Digiron [165]
It should go 4 5 3 2 1
5 0
3 years ago
What happens to energy as we move from step to step in a chain or web
scZoUnD [109]

Answer:Energy decreases as it moves up trophic levels because energy is lost as metabolic heat when the organisms from one trophic level are consumed by organisms from the next level.

Explanation:

6 0
3 years ago
Which studio produced the film The Jazz Singer, the first of many “talkies”?
olga nikolaevna [1]
Warner Brother produced the Jazz Singer. 
8 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
Other questions:
  • An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
    12·1 answer
  • Data administration is a special organizational function that manages the policies and procedures through which data can be mana
    9·1 answer
  • How i can connect to internet automatically when i switch on my computer?
    8·1 answer
  • To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta
    14·1 answer
  • For this assignment, select one of the organizations with a prominent IT department from the Topic 1 assignment. Once identified
    11·1 answer
  • Differences of a desktop computer and a laptop
    13·1 answer
  • I need help ASAP 66 points this is a lab in Testout For Microsoft access I have been at this for about an hour
    10·1 answer
  • I am making a project i have to advertise a product i picked a futureistic car
    10·1 answer
  • Examples of 15 viruses in computer
    10·1 answer
  • The impact of the destruction of train station on the budget of the minister of finance
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!