1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
6

The television is the biggest technological advancement in communication since the telephone.

Computers and Technology
2 answers:
aalyn [17]3 years ago
5 0

Answer:

I believe it would be FALSE

Explanation:

After the telephone it was the internet (communication wise)

docker41 [41]3 years ago
4 0

Answer: just guess its a 50 50 %

Explanation:

You might be interested in
Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
Citrus2011 [14]

Answer:

#include <stdio.h> #define Gray 32.17 /* gravitational constant */ #include <math.h> /*cos definition*/ #define PI 3.14159265

int main(void) double Theta; /*input-angle(radians)of elevation*/ double Distance; /*input-distance (ft) to target */ double Velocity; /*input-projectile velocity (ft/sec)*/ double Time; /* output-time(sec) of flight*/ double Height; /*output-height at impact*/

printf("Enter Distance> "); scanf("%f", &Distance);

printf("Enter Radians> "); scanf("%f", &Theta);

printf("Enter Velocity> "); scanf("%f", &Velocity

Time = Distance / (Velocity * cos(Theta*PI/180.0) ) ;

Height = (Velocity *sin(Theta*PI/180.0)*Time) - Grav*(Time* Time) );

printf("The time of flight is %.3f seconds.\n", Time); printf("The height at impact is %.3f feets.\n", Height);

system("pause");

return (0);

7 0
3 years ago
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
For each of the descriptions below, perform the following tasks:
ss7ja [257]

ANSWER:

1)i. The relationship is a degree of 2 ( i.e Binary). The cardinality of the relationship is One-to-Many.

ii. The model is from piano description to piano manufacturer.

PIANO:

Model name

Model number

Serial number

Manufacturing completion date

MANUFACTURER:

Ebony and Ivory

2)i. The relationship is a degree of 2 ( i.e Binary). The cardinality of the relationship is Many-to-Many.

ii. The model is from piano description to Technician.

PIANO:

Model name

Model number

Serial number

Manufacturing completion date

TECHNICIAN

Employee number

Specialty

3)i. The relationship is a degree of 2 (i.e Binary). The cardinality of the relationship is Many-to-One.

ii. The model is from Technician to Technician

TECHNICIAN:

Lower rank

TECHNICIAN:

Higher rank

5 0
4 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
What does a fallout appear under in a word processing program
andriy [413]

Answer:

It processes paragraphs, pages, and entire papers

Explanation:

7 0
4 years ago
Other questions:
  • If a website ends with .gov does it mean that its written by the government or?
    11·2 answers
  • Is Wikipedia or a .gov website with more information about the subject not a good enough explanation not a good explanation for
    7·1 answer
  • There are how many GPS satellites orbiting the earth
    15·1 answer
  • Explain how class (static) variables and methods differ from their instance counterparts. Give an example of a class that contai
    7·1 answer
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
    12·2 answers
  • Let X and Y be two decision problems. Suppose we know that X reduces to Yin polynomial time. Which of the following statements a
    14·1 answer
  • A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
    9·1 answer
  • What are real online jobs any one of any age can get pays weekly by Pay<br> Pal
    8·1 answer
  • What are the characteristics of the Outlook Rules Wizard? Check all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!