1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
8

Math and science are the foundation from which drafters work True False

Computers and Technology
1 answer:
gogolik [260]3 years ago
5 0

Answer:

the answer is true

Explanation:

because I know

You might be interested in
It is used to select specific menu options, drag and drop options and to draw something on screen.
Novay_Z [31]

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

8 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
frez [133]

Answer:

b. Rubato tremolo

Explanation:

Tremolo is a modulation effect that imposes a rhythmic change in volume of sound. Once discovered in electric amplifier circuits, sound engineers and composers like the Baroque now use this low frequency oscillating modulation technique to create emotional piercing effect on their audience to maintain focus.

The low frequency tremolo can be gotten from the vibrating string in guitars, violins etc, and vocal sound, it is also produced from electronic devices created for its purpose. they are called optical tremolo.

5 0
3 years ago
Stores of data that are so large or complex that it is difficult to process them using traditional data base management applicat
OverLord2011 [107]

Answer: ....

Big Data

Explanation:

Big Data Technology can be defined as a Software-Utility that is designed to Extract,Analyse and  Process  the information from an extremely complex and large data sets which the Traditional Data Processing Software could never deal with. Big data is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.

Predictive analytics assists enterprises in identifying future opportunities and likely risks by distinguishing specific patterns over the historical data. In general, prescriptive analytics is a predictive analytics which prescribes one or more courses of actions and shows the likely outcome/influence of each action.

6 0
3 years ago
A physical cpu core without hyper-threading enabled can process two instructions at the same time.
diamong [38]

A physical CPU core without hyper-threading enabled can process two instructions at the same time is a false statement.

<h3>Can a CPU do multiple things at once?</h3>

Computers are those that do only one task (or process) at a single time. But a computer can alter tasks very fast and can do a lot of work.

The Central processing unit is known to be the brain of the computer system and without it, the computer cannot function or be turn on.

Hence, A physical CPU core without hyper-threading enabled can process two instructions at the same time is a false statement.

Learn more about CPU from

brainly.com/question/474553

#SPJ1

3 0
2 years ago
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
    8·1 answer
  • Which of the following characters is not allowed for java variable names
    7·1 answer
  • Extinction of a species is always a negative impact on the Earth.<br><br> True<br> False
    8·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • Question 1 of 10
    15·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
  • What is algorithm and how does it works​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!