Answer:
Most likely D
Explanation:
I've been using their products for some time now and they do not charge money.
Answer:
The Office used to be free
Explanation:
Thats all i got-
The US Centers for Disease Control and Prevention (CDC) said in a statement on October 22 local time that the director of the agency, Wollensky, tested positive for COVID-19 on the evening of the 21st and had mild symptoms. Wolenski has been vaccinated with the latest COVID-19 vaccine, and is currently isolated at home and will participate in the meeting online.
The director of the Centers for Disease Control and Prevention and the administrator of the Agency for Toxic Substances and Disease Registry, Rochelle Paula Walensky, is an American physician and scientist.
How long after taking Covid may you test positive?
You might continue to test positively for a while after receiving a positive test result. After your initial positive result, you can test positive for antigens for a few weeks. NAAT results can remain positive for up to 90 days.
CDC works around-the-clock to safeguard America from threats to its health, safety, and security, both domestically and abroad.
The CDC battles disease whether it originates domestically or overseas, whether it is acute or chronic, curable or preventable, caused by human error or malicious attack and encourages residents and communities to do the same.
To learn more about Covid-19 refer to:
https://brainly.com/question/28347122
#SPJ1
Answer:
Explanation:
Answer:
The director of the Centers for Disease Control and Prevention and the administrator of the Agency for Toxic Substances and Disease Registry, Rochelle Paula Walensky, is an American physician and scientist.
What is Covid-19?Different people are affected by COVID-19 in various ways. The majority of infected individuals will experience mild to moderate sickness and recover without being hospitalized.
Most typical signs:
fever \scough \stiredness
loss of scent or taste.
Less frequent signs:
throat infection headache aches and discomfort
diarrhea, a skin rash, discoloration of the fingers or toes, or red or itchy eyes.
To learn more about covid-19 refer to the:
https://brainly.in/question/49728785
#SPJ1
A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *
What feature allows a person to key on the new lines without tapping the return or enter key
The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap
How to determine the featureWhen the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.
In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.
This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.
Learn more about word wrap at: https://brainly.com/question/26721412
#SPJ1
What is the data type of the following variable?
name = "John Doe"
In computer programming, a variable is a storage location that holds a value or an identifier. A data type determines the type of data that can be stored in a variable. The data type of the following variable, name = "John Doe" is a string data type.
In programming, a string is a sequence of characters that is enclosed in quotes. The string data type can store any textual data such as names, words, or sentences.The string data type is used in programming languages such as Java, Python, C++, and many others. In Python, the string data type is denoted by enclosing the value in either single or double quotes.
For instance, "Hello World" and 'Hello World' are both strings.In conclusion, the data type of the variable name is string. When declaring variables in programming, it is important to assign them the correct data type, as it determines the operations that can be performed on them.
For more such questions on variable, click on:
https://brainly.com/question/28248724
#SPJ8
Which file must be download it regularly in order for antivirus software to remain effective
Answer:
AV Definition Files.
Explanation:
Antivirus software downloaded Antivirus Definition Files to keep their database up to date in order to effectively catch and stop viruses.
In order to make sure that antivirus software remains effective, you need to download its Definition files.
What are Antivirus definition files?These are files that an antivirus uses to identify threats such as viruses and malware.
These files need to be downloaded and updated regularly to ensure that the antivirus can identify the latest threats and act aganst them.
Find out more on using antiviruses at https://brainly.com/question/17209742.
#SPJ2
sheila makes to do list below she then mages some changes and revises the to-do list which actions did sheila have to take to make the changes observed
Answer: Assign or Edit a task in a task list
Explanation:
Tap more then tap the Tasks tab
Go to the list where you want to edit a task
Tap the task you want to edit.
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
In the winter, municipal snowplows must plow both sides of city streets that are bidirectional
(two-way traffic) but they only make a single pass over unidirectional (one-way) streets. We can
represent city streets as the edges in a graph using nodes for intersections. Of course, it is a
requirement that every street be plowed appropriately (once in each direction for bidirectional
streets and only once in the proper direction for unidirectional streets). Write a program that
uses integers to represent nodes, and tuples (pairs of integers enclosed in parentheses, e.g., (4
7), to represent a street from node 4 to node 7, and a second tuple, (7 4) to represent the fact
that this is a bidirectional street). Assume that there is but a single snowplow and it must start
and return to node 1. Your program must read a collection of tuples from a file and then
produce driving instructions for the snowplow operator telling the sequence of intersections
(nodes) to visit so that all the streets are appropriately plowed. If it is impossible to perform a
correct plowing (some street would be left unplowed or some street would be plowed twice)
your program must report this fact. Your program should repeatedly read collections of tuples
and processes the information until an end-of-file is encountered. Your program will lose a
significant number of points if your algorithm fails to work properly for cities (graphs)
containing both bidirectional and unidirectional streets.
Your solution must include the data file that it uses for input. Remember NOT to use an
absolute path to access the data file – use a relative path. Be certain your data describes several
different city street situations so that your program can demonstrate that it meets all the
requirements.
Using the knowledge in computational language in python it is possible to write a code that represent city streets as the edges in a graph using nodes for intersections.
Writting the code:#include <cv.hpp>
#include <opencv2/highgui/highgui.hpp>
#include "caliberate.h"
#include <iostream>
#include <ctime>
#include <cmath>
using namespace std;
using namespace cv;
VideoCapture capture; //The capture class captures video either from harddisk(.avi) or from camera
Mat frameImg;
Mat g_image;
double dist(Point2i x1, Point2i x2)
{
return sqrt( pow((x1.x-x2.x),2) + pow((x1.y-x2.y),2) );
}
int main()
{
string fileName = "traffic.avi";
capture.open(fileName);
if( !capture.isOpened() )
{
cerr<<"video opening error\n"; waitKey(0); system("pause");
}
Mat frameImg_origSize; //image taken from camera feed in original size
namedWindow( "out" , CV_WINDOW_AUTOSIZE); //window to show output
namedWindow( "trackbar", CV_WINDOW_AUTOSIZE); //Trackbars to change value of parameters
resizeWindow( "trackbar", 300, 600); //Resizing trackbar window for proper view of all the parameters
capture>>frameImg_origSize;
if( frameImg_origSize.empty() ) { cout<<"something wrong"; }
resize(frameImg_origSize, frameImg, SMALL_SIZE, 0, 0, CV_INTER_AREA); //Resize original frame into smaller frame for faster calculations
g_image = Mat(SMALL_SIZE, CV_8UC1); g_image.setTo(0); //Gray image of frameImg
Mat roadImage = Mat(SMALL_SIZE, CV_8UC3); //Image of the road (without vehicles)
roadImage = findRoadImage();
calibPolygon(); //Polygon caliberation: Select four points of polygon (ROI) clockwise and press enter
Mat binImage = Mat(SMALL_SIZE,CV_8UC1); //white pixel = cars, black pixel = other than cars
Mat finalImage = Mat(SMALL_SIZE, CV_8UC3); //final image to show output
time_t T = time(0); //Current time
float fps = 0, lastCount = 0; //frames per second
int thresh_r = 43, thresh_g = 43, thresh_b = 49; //Threshold parameters for Red, Green, Blue colors
createTrackbar( "Red Threshold", "trackbar", &thresh_r, 255, 0 ); //Threshold for Red color
createTrackbar( "Green Threshold", "trackbar", &thresh_g, 255, 0 ); //Threshold for Green color
createTrackbar( "Blue Threshold", "trackbar", &thresh_b, 255, 0 ); //Threshold for Blue color
int dilate1=1, erode1=2, dilate2=5; //Dilate and Erode parameters
Mat imgA = Mat(SMALL_SIZE, CV_8SC3); //Used for opticalFlow
int win_size = 20; //parameter for opticalFlow
int corner_count = MAX_CORNERS; //no of points tracked in opticalFlow
vector<Point2i> cornersA, cornersB;
frameImg.copyTo(imgA);
int arrowGap = 5; //distance between consecutive tracking points (opticalFlow)
createTrackbar("dilate 1","trackbar", &dilate1, 15, 0);
createTrackbar("erode 1","trackbar", &erode1, 15, 0);
createTrackbar("dilate 2","trackbar", &dilate2, 15, 0);
See more about python at brainly.com/question/18502436
#SPJ1
Consider an array of already sorted numbers. Which of the following algorithms would run in O(n) time?: *
A) MergeSort
B) InsertionSort
C) SelectionSort
LinearSearch - Linear search runs in O(n) time as it checks each element in the array sequentially until it finds the desired element.
What is Linear Search?Linear search, also known as sequential search, is a method for finding an element within a list. It sequentially checks each element of the list until a match is found or the whole list has been searched. Linear search runs in at worst linear time and makes at most n comparisons, where n is the length of the list. The time complexity of linear search algorithms, however, can vary depending on the number of elements being searched through and the size of the data set being searched. Linear search is a simple search algorithm and is often used as the starting point for more complex searching algorithms.
To learn more about Linear Search
https://brainly.com/question/13152761
#SPJ4
Complete Question:
Consider an array of already sorted numbers. Which of the following algorithms would run in O(n) time?: * with expalanation.
A) MergeSort
B) InsertionSort
C) SelectionSort
D) LinearSearch
Question 5) What is a feature of podcasts?
A.
They rely on airwaves for broadcasting.
B.
They are inexpensive to produce.
C.
They are accessible only within a specific area.
D.
They require video equipment to create.
E.
They allow easy access to documents.
Answer: B
Explanation: They are inexpensive to produce.
Why should you avoid the use of sarcasm, clichés, and idioms in business
letters
Answer:
Because sarcasm is often misunderstood as something serious, and when they are used in business letters the person reading this will actually think it's something serious leading further complications.
The use of such things is often considered informal and doesn't go well with the formal tone of business letters.
narrative report in computer system servicing
Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.
How would you show an external document in a running presentation?
There are a few steps that show an external document in a running presentation.
What are the steps needed?
1. On the slide, select the icon or link to the object that you want to set to run.
2. On the Insert tab, in the Links group, click Action.
3. In the Action Settings dialog box, do one of the following:
4. To click the embedded icon or link in order to open the program, click the Mouse Click tab.
5. To move the mouse pointer over the embedded icon or link in order to open the program, click the Mouse Over tab.
6. Under Action on click or Action on mouse-over, select one of the options, then select from the list at that option. For example, you can select Run Program and then browse to a program that you want to run, such as a web browser. Or if the object is a document, you can select Object action and then select Open to display the document or edit to work on it during your presentation.
To know more about External document, Check out:
https://brainly.com/question/13947276
#SPJ1
.
What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?
Answer:
Explanation:
These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.
The private information like passwords pin number will be guarded or shared with the public because this gives or acts as a shield or protection or defense in which it can act against any form of unauthorized access to a person's phone, gadgets, computer and personal information.
Why should you use passwords to protect private information?Passwords is known to be that factor that tends to give the primary step of protection or defense against any form of illegal access or activities to our phone, computer and one's personal information.Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.Thus, we have always aware of the use of a strong passwords for all accounts we are using for any kind of purpose.Hence, The private information like passwords, pin number will be guarded or shared with the public because it gives the primary defense where it can act against any form of unauthorized access to a person's computer and personal information.Learn more about Passwords,
https://brainly.com/question/28114889
#SPJ2
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
What was revolutionary about Web 2.0?
Answer:
social media and sites allow people to communicate with others
Explanation:
Hope this helps <3
DOLLAR GENERAL
x
Knowledge Check
Non-employees are allowed in the store before the store opens and after
closing time.
True
False
SUBMIT
Answer:
False
Explanation:
Unless authorized by a manager. Only staff members are allowed in the store before and after normal store hours.
Answer:
The correct answer is
False
If you are not an employee you are not allowed in stores before opening hours or after closing time. The only times non-staff are allowed in the store is for purchasing of products during hours of operation.h
Hope this helps!
Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command
Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.
Writting the code:Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
Number of DB pages allocated = 270
Sweep interval = 20000
Forced Writes are ON
Transaction - oldest = 190
Transaction - oldest active = 191
Transaction - oldest snapshot = 191
Transaction - Next = 211
ODS = 11.2
Default Character set: NONE
Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
...
Default Character set: NONE
See more about SQL at brainly.com/question/19705654
#SPJ1
HOW TO DOWNLOAD BEAMNG DRIVE
Explanation:
Answer:
Explanation:
on what device
what is the electronic defacing of an existing website?; what can encryption technology perform; a user can opt out of receiving emails by choosing to deny permission to incoming emails.; privacy policy details the extent to which email messages may be read by others; what is unsolicited email that plagues employees at all levels and clogs email systems?; what is the type of authentication that requires a username and password?; what was passed to protect minors from accessing inappropriate material on the internet; what is the primary difference between a worm and a virus?
Cybervandalism is the term for electronic tampering with an already-existing website.
What is Cybervandalism?Electronic tampering with an existing website is known as cybervandalism.
Digitally committed harm or destruction is referred to as cybervandalism. Cyber vandals may alter a website (like Wikipedia), produce malware that harms electronic files or adds components that prevent it from functioning normally, or remove a disk drive to render a computer system inoperable.
The unauthorized use of computer networks and other resources to gain access to or send sensitive information is known as cyber espionage.
It is viewed as an increasing issue for organizations, people, and governments.
For instance, the primary incentive for all cybercrimes such as ransomware, phishing, online financial crimes, fraud, password cracking, malware, hacking, and sextortion is financial gain.
However, some of these crimes may also be motivated by pranks, activism, cyber theft, or espionage.
Therefore, cybervandalism is the term for electronic tampering with an already-existing website.
Know more about Cybervandalism here:
https://brainly.com/question/8969166
#SPJ4
Correct question:
What is the electronic defacing of an existing website?
where in system settings can you find which version of Windows is installed on your computer?
Answer:
Select the Start button > Settings > System > About . Under Device specifications > System type, see if you're running a 32-bit or 64-bit version of Windows. Under Windows specifications, check which edition and version of Windows your device is running.
Explanation:
brainliest pls
Why would someone chose to use lamp over iis
Answer:
open source
Explanation:
LAMP technology is open source and extremely secure, and it runs on the LINUX operating system.
Why is LAMP technology a popular choice?It provides complete flexibility in building and deploying apps based on your specific business requirements. LAMP technology is safe and reliable. It has a strong security mechanism to prevent vulnerable assaults, and if an error arises, it can be repaired swiftly in a cost-effective manner.The LAMP stack is a versatile option for constructing web infrastructure. Developers can create online content, add dynamic application features, and administer the database.LAMP technology is open source and extremely secure, and it runs on the LINUX operating system. When compared to other software architectural bundles, the LAMP stack is quite inexpensive.To learn more about LAMP technology refer,
https://brainly.com/question/17241979
#SPJ1
For each of the following questions, be sure to choose not only the correct answer but the *canonically correct* answer. There may be one or more answers which are correct, but some of those answers may not be conventional use.
Question 1 (1 point)
Which of the following will allocate a buffer suitable for 4 integers?
Question 1 options:
int *ptr = (int *)malloc(sizeof(int) * 4);
int *ptr = (int * 4)malloc(sizeof(int));
int *ptr = (int *)malloc(4);
int *ptr = malloc[4];
Question 2 (1 point)
For the following program, which satement best fits as a parameter for the printf() call?
#include
typedef union u_foo {
int iValue;
float fValue;
} Foo;
void main(int argc, char **argv) {
Foo foo;
foo.iValue = 42;
printf("The value of foo is %d\n", );
}
Question 2 options:
foo.fValue
foo.iValue
(&foo)->iValue
(*(&foo)).iValue
Question 3 (1 point)
In the following makefile, what is the target `foo` dependent upon?
all: foo
foo: foo.c
gcc -o foo foo.c bar.c
bar: bar.c
gcc -o bar bar.c
clean:
rm foo bar
Question 3 options:
foo.c and bar.c
bar
all
foo.c
Question 4 (1 point)
For the following header file, which statement best declares a function that takes 2 integer parameters?
#ifndef SOMETHING__H
#define SOMETHING__H
#endif // SOMETHING__H
Question 4 options:
int foo(int a, int b);
extern int foo(int a, int b);
extern int foo(int *a, int *b);
static int foo(int a, int b);
Question 5 (1 point)
For the following program, what line is best applied to release the allocated memory?
#include
int main(int argc, char **argv) {
char *buf = malloc(32);
// assume buf is used appropriately here
}
Question 5 options:
release(buf);
free(buf);
free(32);
delete(buf);
Question 6 (1 point)
In the following program, which statement will properly copy the contents of `foo` to `bar`?
#include
#include
#include
int main(int argc, char **argv) {
char *foo = "This is a statement of intent";
char bar[16];
memset(bar, 0, 16);
}
Question 6 options:
memcpy(bar, foo, 15);
strncpy(bar, foo, 16);
strcpy(bar, foo);
strcpy(foo, bar);
Question 7 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
Foo *pFoo = &foo;
printf("The value of foo is %d\n", );
}
Question 7 options:
pFoo->value
*pFoo->value
pFoo.value
(*pFoo).value
Question 8 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
printf("The value of foo is %d\n", );
}
Question 8 options:
(*foo).value
foo->value
*foo.value
foo.value
Question 9 (1 point)
For the following header file, which line of code is missing?
#ifndef SOMETHING__H
extern int foo;
#endif
Question 9 options:
#define SOMETHING__H
// SOMETHING__H
static int foo();
typedef foo something;
Question 10 (1 point)
What is the size in bytes of the following structure?
struct t_foo {
int bar: 6;
int baz: 5;
int bat: 2;
};
Question 10 options:
12
13
16
2
Question 11 (1 point)
For the following program, what is the best way to get a block of memory on the heap for the variable `foo`?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo *foo = ;
}
Question 11 options:
malloc(sizeof(t_foo))
malloc(8)
{ 42 }
malloc(sizeof(Foo))
Question 12 (1 point)
For the following program, which line of code will place the contents of the file into the memory for the variable `buf`?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
int fsize = // ASSUME WE GET THE SIZE OF THE FILE HERE
char buf[128];
// MORE PROGRAM CODE HERE
}
Question 12 options:
fread(fp, buf, fsize)
fread(buf, fp, fsize, 1)
fread(fp, fsize, buf, 1)
fread(buf, fsize, 1, fp)
Question 13 (1 point)
For the following program, which line of code will get the size of the file in question?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
fseek(fp, 0, SEEK_END);
fseek(fp, 0, SEEK_SET);
}
Question 13 options:
int fsize = ftell(fp);
int fsize = fp.position;
int fsize = ftell(&fp);
int fsize = fread(fp, 1);
Question 14 (1 point)
For the following program, which is the best type for the variable `next`?
#include
typedef struct t_foo {
int value;
next;
} Foo;
void main(int argc, char **argv) {
Foo foo;
}
Question 14 options:
struct t_foo
Foo
struct t_foo*
Foo *
Question 15 (1 point)
In the following program, what is the value of `*ptr`?
#include
int main(int argc, char **argv) {
int foo[] = { 0, 1, 2, 3, 4 };
int *ptr = &foo;
do {
++ptr;
} while (!ptr);
}
Question 15 options:
foo[1]
2
0
1
Answer:
12
Explanation:
enters integral values
in the situation above, what ict trend andy used to connect with his friends and relatives
The ICT trend that Andy can use to connect with his friends and relatives such that they can maintain face-to-face communication is video Conferencing.
What are ICT trends?ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.
If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.
Learn more about ICT trends here:
https://brainly.com/question/13724249
#SPJ1
Which of the following is an example of software piracy?
A) copying software from work to use at home
B) buying software to use in your home office
C) taking corporate secrets from work to sell
D) working at two jobs that are both in the IT field
Answer:
A
Explanation:
Piracy mean we use software without legal permission from the maker or manufactures it some time may have viruses that leak your data it simply means not true copy just some modification
Answer:
A Copying software from work to use at home
Explanation:
Pretend you are planning a trip to three foreign countries in the next month. Consult your wireless carrier to determine if your mobile phone would work properly in those countries. What would the costs be? What alternatives do you have if it would not work?
Upon consultation with the wireless carrier the repone was that the cost will go up by 25 % of the normal charges. This type of service is called roaming. The alternatives were to purchase new devices and plans compliant with the local network. These in themselves are additional costs and it is much more easier to go with the current provider.
Who is a wireless carrier?The term "wireless carrier" refers to a provider of commercial mobile services or any other radio communications service required by the FCC to offer wireless 9-1-1 service.
Mobile network operator, mobile phone operator, mobile operator, cellular corporation, and wireless service provider are all words that relate to the same entity.
Learn more about wireless carrier:
https://brainly.com/question/31943799
#SPJ1
Endnotes are indicated by
A. lowercase letters (a, b, c)
B. numbers (1, 2, 3)
C. Roman numerals (i, il, ill)
D. uppercase letters (A, B, C)
They
Answer:
The answer is D because u have the uppercase letter bold
Answer:
Endnotes are actually indicated by Roman Numerals so option C is correct.
Which type of boot authentciation is more secure?
a) Power-on Password or supervisor password?
b) Drive password
c) Full disk encryption
d) Windows password
Which phrase identifies the standard difference in elevation on a topography map?
index contour
contour interval
scale bar
topographic symbol
Answer:
contour interval
Explanation:
The standard that tells the elevation and the difference in topography on the map is that of the contour interval that is it identified the range form the lowest to the highest terrain elevation in meters measured from the sea level. It is also called as C.I and refers to the imaginary lines drawn which has a constant value.Answer:
B. contour interval
Explanation: