1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
5

. What process skill would a scientist use to find the length of a line

Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
7 0

Answer:

Explanation:

A ruler

;););););););););););););););)

You might be interested in
What is the most common data link layer protocol for a wired connection
krek1111 [17]
I think the answer is The PPP (Point-to-Point Protocol). <em />

It is the most common type of protocol that people use using a modem, a device or a router to have an internet connection. Here there two systems that establish a link to each other which is the point to point. The bits are transferred to a sender and a receiver. 

4 0
3 years ago
Read 2 more answers
How is a contact list different from an address book
WITCHER [35]
An address book has a list of addresses
7 0
3 years ago
Read 2 more answers
How many times can a simulation be repeated?
Vinvika [58]

Answer:

Explanation:

A general idea is that you should repeat the simulation until the results converge. An easy but illustrative example of this is that we want to see if the R function rbinom is accurate in simulating a coin toss with a given probability. We will simulate one coin toss 10000 times, and plot the percentage of heads against the number of coin tosses:

set.seed(1)

n <- 10000

result <- NULL

percent <- NULL

for (i in 1:n) {

 result[i] <- rbinom(1,1,0.5)

 percent[i] <- sum(result)/i

}

plot(seq(1:10000),percent, type="l")

abline(0.5, 0, lty=2)

5 0
3 years ago
Which of the following is not an internet browser?
fenix001 [56]
D thunderbird is an email service
6 0
3 years ago
Read 2 more answers
What does CIA stands for​
photoshop1234 [79]

Central Intelligence Agency

6 0
3 years ago
Read 2 more answers
Other questions:
  • What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its impo
    7·1 answer
  • A major weakness of a lot of file processing systems is that ____.
    10·1 answer
  • Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
    15·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • ? Question
    6·2 answers
  • An application programming interface (API) is ________. Select one: A. the code to interface between an application and RAM B. t
    15·1 answer
  • Java public class Odds { public static void main(String[] args) { printOdds(3); printOdds(17/2); int x = 25; printOdds(37 – x +1
    12·1 answer
  • Two strategies for keeping your files in sync
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!