1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
2 years ago
15

10

Computers and Technology
1 answer:
Nataly_w [17]2 years ago
7 0

Ok so I don't know what your text is about so you'll have to figure that out your self

Scientists track these measurements to make a final model because using the research data from the previous model can show the grows and glows of that model. Using this data scientists can improve whats needed.

You might be interested in
Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
Juli2301 [7.4K]

Answer:

hueiweke

Explanation:

5 0
2 years ago
What does it mean to read visual and audio text
Ymorist [56]

To find meaning and decipher relationships between symbols and information


Talking books could be a means to automatize and generalize such an audio–visual reading experience. ... RWL consists of an experimental reading situation where one reads a text while one can hear it said aloud by a pre-recorded speaker or by a text-to-speech system.

8 0
4 years ago
For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
Vladimir [108]

Answer:

hi your question lacks the necessary matrices attached to the answer is the complete question

1024 bytes

Explanation:

A) The minimum size of the cache to take advantage of blocked execution

 The minimum size of the cache is approximately 1 kilo bytes

There are 128 elements( 64 * 2 ) in the preceding simple implementation and this because there are two matrices and every matrix contains 64 elements .

note:  8 bytes is been occupied by every element therefore the minimum size of the cache to take advantage of blocked execution

= number of elements * number of bytes

= 128 * 8 = 1024 bytes ≈ 1 kilobytes

7 0
3 years ago
Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
Luden [163]

Answer:

The answer is A,B,D.

Explanation:

The answers: days of vacation time left

days of school left in the year & years of service someone performed

were correct on edgenuity. (IG:ixv.mona)

5 0
3 years ago
witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
Nikitich [7]

SWITCH BETWEEN OPEN PRESENTATIONS. ..... Presentation software is a program designed for the production and display of .... image file format and version number. 1. .... Option. To Do This. Normal. Contains three panes: the outline pane, the slide pane, and the notes pane. .... appear on every slide in a presentation.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
    9·1 answer
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • According to company policy and administrator must logically keep the Human Resources department separated from the Accounting d
    5·1 answer
  • An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:______
    13·1 answer
  • What is the second step when designing an algorithm?
    12·2 answers
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • St. CHarles school's music community is organizing a fundraiser. They want to create a simple but attractive website. However, t
    7·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!