1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
2 years ago
14

Observation and screening data should not influence curriculum development true or false?

Computers and Technology
1 answer:
Anton [14]2 years ago
8 0

Answer:true

Explanation: we cant rely on computers

You might be interested in
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
vodomira [7]

Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.

  • Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.

It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.

See full question below

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Select an answer:

A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.

B. He connected to an outside data source.

C. He dragged and dropped the file into Tableau.

He duplicated the data in Tableau.

Learn more from

brainly.com/question/22908883

3 0
3 years ago
BitLocker Encryption can be deployed three ways. Identify which of the descriptions best describes the Computer Authentication m
ch4aika [34]

To  know  the descriptions best term about the Computer Authentication method is that On the motherboard of many laptops is a chip known as the TPM (Trusted Platform Module) chip. The BitLocker encryption key can be found on the TPM chip (also called the startup key).

<h3>How can a computer be verified?</h3>

The user or machine must demonstrate their identity to the server or client during authentication. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are further options.

Therefore, Data theft or exposure from lost, stolen, or improperly retired computers is a hazard that is addressed by the OS system-integrated data protection feature BitLocker Drive Encryption.

Learn more about Computer Authentication method from

brainly.com/question/3522088
#SPJ1

3 0
1 year ago
Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
maw [93]

Answer:

the answer is

Explanation:

3 0
4 years ago
What should you adjust to make your hard hat fit properly?
schepotkina [342]
You should adjust the headband to make your hard hat fit properly.
5 0
3 years ago
Which are examples of traditional computer-based technology?
marta [7]

Answer:

Explanation:

Spreadsheet software is the correct answer

8 0
3 years ago
Read 2 more answers
Other questions:
  • You just read an msds for acetic acid. based on what you read, what type of information is included in an msds sheet? record you
    7·1 answer
  • PLEASE HELP
    13·2 answers
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • You are part of which sphere of Earth?
    13·2 answers
  • Which of the following is not a natural resource
    11·2 answers
  • Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
    10·2 answers
  • What is 38 - -93 + 2 x 4.6?<br> and what’s 9,220 - -2.3 x U
    6·1 answer
  • Which IDE component provides keyword highlighting and text auto-completion?
    8·2 answers
  • Please help me what is an example of a growing trend on social media
    9·1 answer
  • Which of the following<br> Services are<br> functions performed<br> by the general office?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!