1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
13

What problems might scientists encounter in using this ethod in the field that you would not have encountered in the simunlation

?
Computers and Technology
1 answer:
JulsSmile [24]3 years ago
5 0

Answer:

Errors that would be observed as a result of natural input in the field not found in the simulation.

Explanation:

The simulation is a virtual representation of the activities to be experienced in the field, it eliminated natural factors that could affect the result of the experiment in the field. In the field, scientists are able to anticipate errors based on records of natural factors like temperature, humidity, etc, working around it to get the desired result.

You might be interested in
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses
Fed [463]

The answer is Sensitivity

Tahir can restrict actions a recipient can take on the messages he sends. It is recommended that you use IRM (Information Rights Management) if available. Choosing the private option will restrict the recipient from taking actions such as forwarding a confidential message to another person. When Tahir selects the private option, the recipient of the message will see a “please treat this as private” in the information bar.

3 0
4 years ago
Write the definition of a function named max that receives an int parameter and returns the largest value that it has been calle
kkurt [141]

Answer:

Following are the code in the C language .

int max(int x) // function definition

{

static int largest=0; // variable declaration

if (x>largest) // checking the condition

largest=x; // assign the value of input in the largest variable

return largest; // return the largest number

}

Explanation:

Following are the description of code .

  • Decalred a function max of int type which hold a parameter x of int datatype.
  • In this function compared the number x with the largest .If this condition is true then largest number hold the value of x variable
  • Finally return the largest number .
8 0
3 years ago
4. What is the formula for calculating the file size?
Verizon [17]
Step 2: Multiply total number of pixels by the bit depth of the detector (16 bit, 14 bit etc.) to get the total number of bits of data. Step 3: Dividing the total number of bits by 8 equals the file size in bytes. Step 4: Divide the number of bytes by 1024 to get the file size in kilobytes.
7 0
3 years ago
The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
NNADVOKAT [17]
1970-80s which is when some of the first computers were created like apple computers which looked like a giant cube and a rectangle on the side which is very different than what we have today.

Hope this helps!
3 0
4 years ago
Other questions:
  • A car moves down the street at 45 kph. The driver takes his foot off the gas pedal but does not brake. Which is the correct expl
    5·2 answers
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Basic engine operation can be divided into four stages. These stages are
    13·1 answer
  • Write a main method that prompts the user for an integer between 1 &amp; 20 (inclusive). If the user enters an invalid number, p
    8·1 answer
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • Which is a correct way to test whether two variables representing numbers, numOne and numTwo, are equal?
    8·1 answer
  • Which of the following is an example of fine art? 1. fashion 2. interior design 3. painting 4. product design
    7·2 answers
  • Write a program that simulates rolling one die using the following steps: 1. Prompt the user for the number of sides on the die.
    13·1 answer
  • Match the spreadsheet functions to their operations.
    10·1 answer
  • The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!