1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
8

A researcher is interested in learning more about the different kinds of plants growing in different areas of the state she live

s in. The researcher creates an app that allows residents of the town to photograph plants in their area using a smartphone and record date, time, and location of the photograph. Afterwards the researcher will analyze the data to try to determine where different kinds of plants grow in the state.Which of the following does this situation best demonstrate?A. Open dataB. Citizen scienceC. CrowdfundingD. Machine Learning
Computers and Technology
1 answer:
nekit [7.7K]3 years ago
6 0

The answer is

B. Citizen Science

This is because Citizen Science is data collected by normal citizens that collect data as Amateur Scientists.

You might be interested in
You are a psychologist who needs to provide a qualitative evaluation for IQ scores. Create a program that takes IQ scores (one a
dsp73

Answer:

Check the explanation

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int getIQ(); // return the score

void printEvaluation(int);

int main()

{

   int IQ = 0;

   IQ = getIQ();

   

   printEvaluation(IQ);

   return 0;

}

int getIQ()

{

   int score = 0;

   cout << "Please enter your IQ Score to receive your IQ Rating:\n";

   cin >> score;

   

   return score;

}

void printEvaluation(int aScore)

{

   cout << "IQ Score: " << aScore << " IQ Rating: ";

   

   if (aScore <= 100)

   {

       cout << "Below Average\n";

   }

   else if (aScore <= 119)

   {

       cout <<"Average\n";

   }

   else if (aScore <= 160)

   {

       cout << "Superior\n";

   }

   else if (aScore >= 160 )

   {

       cout << "Genius\n";

   }

}

4 0
3 years ago
The definition of HTTP makes use of the ASCII character set without reference to how these characters are encoded. Explain why t
solniwko [45]
Abstraction comes from two latin words; abs which means away and trahere which mean to draw. From the meaning itself, it is to draw away something from specific objects, individuals, group, etc. In the computer world, a programmer hides all relevant data pertaining to the relevance of a data. It is done to increase efficiency and and reduce complexity. 
4 0
3 years ago
Read 2 more answers
What Active Directory object enables an administrator to configure password settings for users or groups that are different from
e-lub [12.9K]

Answer:

Password Settings object

Explanation:

Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.

In AD, the data stored are also known as Objects, these objects can be

  1. users or a group that has been given passwords and/or
  2. resources such as computers or printers.
  3. Organizational Units (OUs)

The object responsible for handling the configuration of passwords configuration is the Password Settings object.

Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.

8 0
3 years ago
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
pshichka [43]

Answer:

This type of attack is called Malvertising

Explanation:

Malvertising (Malware Advertising)  is a term in computer security that refers to the act of spreading computer malware through online advertisements. It is done by injecting malicious code into genuine online advertisement platforms or malicious webpages that appear as though they are genuine and from reputable third-party advertisers. While it is quite a new concept it is difficult to combact because content for advertisement can be placed in genuine and reputable websites that users trust.

3 0
3 years ago
What is the transfer rate of DDR memory?
hoa [83]

DDR memory is 64-bit so that means that it is 64

5 0
3 years ago
Other questions:
  • Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
    5·1 answer
  • Suppose you want to view a document that has several headings. what view would you use?
    6·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • A company currently uses Microsoft Active Directory as its identity provider. The company recently purchased Oracle Cloud Infras
    13·1 answer
  • Discuss how the accessibility of television has changed over time
    7·1 answer
  • What is the critical path?
    15·1 answer
  • When Creating a FPS game what basic rules would you add?
    12·1 answer
  • What are the benefits and risks of a client-server network?
    5·1 answer
  • 19. List three things you can do to protect your online reputation:
    7·1 answer
  • What is a circular network.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!