1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
13

Why would students most likely need to collect data? Check all that apply

Computers and Technology
2 answers:
PtichkaEL [24]3 years ago
8 0

Answer:

A, C, and D

Explanation:

n200080 [17]3 years ago
5 0
Well I would think all of them in some way. For the first one, students need to collect data (whether it’s mathematical, scientific, etc.) to answer a question. For the second one, they may need to know how much money is in there bank account or they may need to calculate a sale to order the item. For the third one, they may need statistical data to support a position. For the last one, a student could use technological data to be able to solve their problem sorting documents.
You might be interested in
CALLING ALL COMPUTER SCIENCE LOVERS!!!!!!!
Anni [7]

Answer:

# Instead of repeating code over and over

forward(10)

left(90)

forward(10)

left(90)

forward(10)

left(90)

forward(10)

left(90)

# Use a for loop to repeat the code!

for i in range(4):

   forward(10)

   left(90)

# You can use the i variable inside the loop

# i starts at 0, and goes up to COUNT-1

# This will make Tracy move forward 0, then 1, then 2

for i in range(3):

   forward(i)

# You can change the value of i inside a for loop by using mathematical expressions

for i in range(3):

   forward(i*10)

# You can also control the value of i by using extended parameters

for i in range(STARTING_VALUE, ENDING_VALUE, INCREMENT):

# This will move Tracy forward 25, 50, and 75 pixels

for i in range(25, 76, 25):

   forward(i)

love you guys <3

4 0
2 years ago
When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
GalinKa [24]

Answer:

The following steps will help you design a safe and effective stretching program.

Explanation:

1. You will have to follow the ACSM's guidelines used for flexibility training.

2. evaluate your flexibility rate with the "sit-and-reach" test.

3. you have to also apply the basic principles of FITT in designing your own program.

4. have a "range-of-motion" tests performance.

5. make use of SMART guidelines when setting explicit flexibility goals.

7 0
3 years ago
Who conceptualizes the design and the working of a website
Citrus2011 [14]
Answer is "Web Designer".

Web Designers are the "artists" of the website. They conceptualize the layout and functionality of the site, from features to format. They may do little coding, and are mostly involved in the creative elements of web design. The Web Developer is less big-picture, and more knitty-gritty building of the website. She is the one who does the coding and actually builds the website, using the web designer's model. 
3 0
3 years ago
A 30V battery maintains a current through a 10 Ω Resistor. What is the current flow through the resistor?
Troyanec [42]

Answer:

3 amps

Explanation:

because as per ohm's law. "electric current is proportional to voltage and inversely proportional to resistance"

7 0
4 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
4 years ago
Other questions:
  • Discuss why mtv initially had a difficulty securing enough ads
    10·1 answer
  • Wap-enabled devices require a ________, a special web browser that has all the features of computer-based browsers but is simpli
    11·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Display the total number of parking tickets.
    5·1 answer
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • How does applying Fontworks effects to text on an advertising flyer change the text?
    14·2 answers
  • With which type of test question should you leave yourself extra time to answer?
    14·2 answers
  • What is your impression on the subject fundamentals of database systems?​
    7·1 answer
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!