1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
7

What are important requirements for a frame of reference to identify an object's location, and to communicate that location to a

nother person
Computers and Technology
1 answer:
gogolik [260]3 years ago
4 0

Answer:  Set a scale, or method of determining distance, within your system. Identify an origin near an object—specifically something fixed.

Explanation:

You might be interested in
According to the 2010/2011 Computer Crime and Security Survey, ____ is "the most commonly seen attack, with 67.1 percent of resp
loris [4]

Answer:

Malware infection

Explanation:

Infecting computers with malware through the internet has become the most commonly seen attack according to 2010/2011 Computer Crime and Security Survey.

6 0
3 years ago
Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
madreJ [45]

Answer:

D. The image will require fewer bits in order to be represented.

Explanation:

Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

5 0
3 years ago
CodeHS Python Rainforest Exercise 5.4.7: Categories
Butoxors [25]

Answer:

List1=[['Physics','Quantum Physics','Theory of Relativity'],['Geometry', 'Plane Geometry', 'Coordinate Geometry']]

i=0

k=0

for i in range(0,2):

   print("Category:"+List1[i][0])

   for k in range(1,3):

       print("\t"+List1[i][k])

   

Explanation:

The program required is mentioned above. And it has limitations, but is good enough to explain the fundamentals required.

6 0
4 years ago
What does a code of conduct include?
mariarad [96]
The answer is a set of rules for behavior when using the internet 
For example online bullying defies the code of conduct. 
3 0
3 years ago
Which part of the cpu holds the memory address for the next instruction to be processed?
aleksley [76]
Register, google CPU registers for more info
7 0
4 years ago
Other questions:
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • The term median means
    9·2 answers
  • A tripod head can move vertically or horizontally. What term describes these movements?
    15·2 answers
  • How would you use Microsoft Excel to
    10·2 answers
  • Your laptop donot have a serial port. what type of connector will your laptop requireyour laptop donot have a serial port what t
    7·1 answer
  • CLICK ME IF U DARE hehehe
    10·2 answers
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • Pls help I will give points
    7·1 answer
  • Which of the following is adoptable in Mindanao only?​
    5·1 answer
  • Segregation based on laws is called _____
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!