1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksandrR [38]
2 years ago
11

study the picture of the simulation and the graph above. based on the information obtained from your study of the simulation and

graph make a prediction and choose what do you think the final temperature of the water will be if the cylinder was dropped from 800 m
Computers and Technology
1 answer:
andreyandreev [35.5K]2 years ago
6 0
This is how you know i’m def gonna fail my university class this year :/
You might be interested in
Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is wo
Liono4ka [1.6K]
Have the packets virtual
6 0
3 years ago
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
Can Word Processing (WP) programs be used for DTP? Explain your answer
siniylev [52]

Word Processing Programs cannot be used for DTP

Explanation:

DTP software cannot be replaced with Word Processing Programs.  DTP software is used for creating publishing document like post card, business card, calendars, and books where as the word processing software is used for creating and editing predominantly text document and once can edit text, copy, paste , delete and format text. Word processor relies heavily on editing of the contents rather than graphics or page layout where as DTP software is used to create image heavy newsletters, magazines, adverts, and brochures where layout is important.

4 0
3 years ago
A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not dete
GenaCL600 [577]

Answer:

a simple IF statement using Regex

Explanation:

In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.

5 0
3 years ago
An IT security threat is anything that might cause serious harm to a computer system.
Blababa [14]

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

5 0
2 years ago
Other questions:
  • What is connectivism and how does it apply to online learning?
    7·1 answer
  • This matches the domain name with the correct IP address:
    12·1 answer
  • What is wrong with the following code?
    11·1 answer
  • Plz answer this....quickkkkk​
    7·2 answers
  • HELP PLEASE
    7·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • 1. (A) What do you mean by computer? Discuss the use of<br> computer in daily life.
    14·2 answers
  • Large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
    8·1 answer
  • terms found in provider documentation (e.g., difficult, extensive, or unusual) would support adding modifier to a cpt code.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!