1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
3 years ago
5

Throughout the lecture, the teacher speaks about the defintion of "Science"

Computers and Technology
2 answers:
Arlecino [84]3 years ago
8 0

Answer:

I would say A. Since that is pretty much the Scientific Method.

Explanation:

Yeah

Nikitich [7]3 years ago
7 0

Answer: B. Science is using different skills to make models

Explanation: On Edge!!!!!!!!!!!!!!!!

You might be interested in
The statistical report is typically used to set targets for the organization's expenditures for the year and then report actual
Snowcat [4.5K]

Answer:

False

Explanation:

Budget and Financial reports are used to set targets for organization's expenditure. These reports display cost and expenditures related to all assets, raw material, inventory of the organization. The variance is then calculated based on targeted figures and the actual expenses. The deviation from target is found by the variance and then actions are taken for it. Managers rely heavily on these reports. Statistical reports are non financial reports. These focus on customer satisfaction, employee performance, staff turnover rate and assets performance.

5 0
3 years ago
What is the flow of electrons called?
kondaur [170]

Answer:

Electricity is the flow of electrons through a conductor, usually in the form of a wire, this flow is called an electric current.

4 0
3 years ago
____ variables are variables that are shared by every instantiation of a class. local instance
Colt1911 [192]

These are known as class variables, so called because of the property mentioned.

4 0
3 years ago
When is the following expression true? (2 points)
ipn [44]

Answer:

1) If and only if a and b have different values

Explanation:

Given

Expression: !(!a || b) || (!a && b)

Required

When is it true?

The expression is true when the values a and b are different and the proof is as follows.

(1) Assume that: a = true and b = false

!(!a || b) || (!a && b)  

= !(!true || false) || (!true && false)

!true = false, so the expression becomes:

= !(false|| false) || (false && false)

In boolean, false|| false = false and false && false = false. So, we have:

= !(false) || (false)

!(false) = true, so, the expression becomes:

= true || (false)

Lastly, true || false = true

(2) Assume that: a = false and b = true

!(!a || b) || (!a && b)  

= !(!false|| true) || (!false && true)

!false = true, so the expression becomes:

= !(true|| true) || (true && true)

In boolean, true|| true = true and true && true = true. So, we have:

= !(true) || (true)

!(true) = false, so, the expression becomes:

= false|| true

Lastly, false || true = true

<em>This expression is false if a and b have the same value</em>

4 0
3 years ago
What happens when a computer gets a virus?
Volgvan
You will start to get ad pop-ups like crazy, and your computer will be a lot slower. I'd recommend that you be careful downloading things, make sure it's the right thing you're downloading. Some people make false websites. Also the best thing to do is get a usb drive and store everything you want to keep and reset your computer to factory in your settings.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which sector provides scope for multimedia designers?
    10·1 answer
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • The best presentations try to include as much text as possible on each slide. True False
    6·2 answers
  • What function does a security certificate perform
    15·2 answers
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
    13·1 answer
  • This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a windows co
    10·1 answer
  • What is an example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers?
    14·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • Describe how a black and white image could be represented in binary
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!