1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
8

What is geolocation?

Computers and Technology
1 answer:
Nataliya [291]3 years ago
4 0

Answer:

B

Explanation:

This is the correct answer because it correctly defines <em>geolocation </em>itself, the others go deeper and define select geolocation <em>services. </em>

You might be interested in
How is your day going who wants to hit <br><br><br><br> Jk, go find someone else.
kap26 [50]
Lol my days been hectic wby. I’ve been studying
3 0
4 years ago
WILL GIVE BRAINLIEST AND 75 POINTS!!!
pshichka [43]

Answer:

Glomar Challenger studies about the "age of rocks in various places in the ocean" in 1968

Explanation:

Glomar Challenger was a "deep sea research vessel" for marine geology and oceanography studies.

The vessel set out in 1968 on a "Deep Sea Drilling Program" in the Atlantic Ocean.

Samples were collected from various drilling locations and the study and analysis of these samples enabled the study of plate tectonics.

These samples also provided more information related to the rocks in oceans.

The vessel drilled cores containing rock salt, gypsum, anhydrite and several other evaporating minerals.

8 0
4 years ago
Read 2 more answers
What company was affected by the cloudbleed vulnerability?
DIA [1.3K]

The <em>cloud bleed vuneraliblity</em> describes the security flaw which was discovered in 2017 and had affected internet service company CloudFlare and many websites using the company's services.

CloudFlare is a internet service company which operates to provide security of data to millions of websites. However, a glitch occured during a certain security update which led to a loophole which wasn't discovered for months.

This made the user data on CloudFlare's network susceptible over the course of that period. It was reported that companies such as Uber, OKcupid and several others on the CloudFlare security network were affected.

Therefore, the company affected by the cloud bleed vuneraliblity is CloudFlare.

Learn more :brainly.com/question/25018707

7 0
3 years ago
Which type of approach grew out of the development of computers, where even complex behavior such as learning, remembering, cate
mestny [16]

Answer:

In studies of technology and innovation, it is common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology systems. Another distinction is between technology s hardware, software and orgware; sometimes socioware is added as yet another layer or category. In he studies, the focus is usually on a particular technology, either a process technology or product

Ž echnology with product technology broadly de In studies of technology and innovation, it is

common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology. Another distinction is between technology as hardware, software and orgware; sometimes socioware is added as yet another layer or category. In the studies, the focus is usually on a particular technology, either a process technology or product.  

Explanation:

7 0
3 years ago
Where is the insert function button found in microsoft excel?
Andreyy89
<span>One such feature in Microsoft Office XP is Microsoft's Clip Organizer, a stand-alone program that allows you to organize and use drawings, photographs, sounds, videos, and other media clips with presentations, publications, and any other Office documents.</span>
4 0
3 years ago
Other questions:
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    9·1 answer
  • CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
    6·2 answers
  • What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
    14·1 answer
  • Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
    11·1 answer
  • Why use LinkedIn Sales Navigator?
    5·1 answer
  • What do you use the Pygame library for?
    6·1 answer
  • List three ways you can help somone who is being cyber bullied instead of just being a bustander​
    7·2 answers
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • Hey guys,i have a question. 2x + 7x + 1y.how do i simplify it
    11·1 answer
  • A(an)_______is built-in preset calculation. <br>formula <br> function <br>equation <br>AutoSum​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!