Please help. Thanks

Satellite images are based on data obtained by Landsat satellites.


Please select the best answer from the choices provided

T
F

Answers

Answer 1

Answer:

Answer: T (true)

Satellite images are based on data obtained by Landsat satellites. The process of surveying is used by computer mapmakers to convert information into computer language. Satellite images are formed of pixels. With computers, mapmakers can store, process, and display map data electronically.

Landsat satellites have the optimal ground resolution and spectral bands to efficiently track land use and to document land change due to climate change, urbanization, drought, wildfire, biomass changes (carbon assessments), and a host of other natural and human-caused changes.


Related Questions

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Choices

120 and 60
60 and 30
5 and 10
30 and 60

Answers

Answer:

30 and 60

Explanation:

1222222222222222222222222222222

Answers

Answer:

whats that bro

Explanation:

brainliest me bro

How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices

Answers

Answer:

A small screen limits the information that can be legibly displayed. While designing, text and images can quickly consume the limited screen space, causing a trade-off between content and user interactions. Given that smartphones are equipped with touch-based interfaces that allow intuitive and dynamic interactions, an increase in screen size offers a larger surface for interactions and a greater sense of controllability. Large screens also enable the utilization of various communication modalities.

Explanation:

I hope this helps!

Briefly discuss what is the basic architecture of a computer system?

Answers

Answer:

From strictly a hardware aspect;

Explanation:

The basic architecture of a computer is the case (otherwise known as tower), the motherboard, and power supply unit. The case is used to house all of the necessary parts for the computer function properly. The motherboard will serve as the bridge between all other connections, and the power supply unit will deliver capable power to the rest of the system.

What does the example of Friendster illustrate about social media platforms?

A.
People are loyal to social networking sites.

B.
Users will have little patience for technical issues.

C.
Professional networking sites are more popular than social networking.

D.
Most social media platforms don’t last more than a year.

Answers

Answer:

A

Explanation:

It's just what it's meant it doesn't need much explanation

People are loyal to social networking sites is example of Friendster illustrate about social media platforms.

What are social media platforms?

Websites and programs that emphasize collaboration, sharing of content, engagement, and community-based feedback are collectively referred to as social media.

Social media is used by people to connect and communicate with their friends, family, and other communities. Social media applications are used by businesses to track consumer complaints as well as market and promote their products.

Websites that cater to businesses selling to consumers have social features like comment sections for users. Businesses can track, evaluate, and analyze the attention their firm receives from social media, as well as brand perception and customer insight, using a variety of technologies.

Therefore, People are loyal to social networking sites is example of Friendster illustrate about social media platforms.

To learn more about Social media platforms, refer to the link:

https://brainly.com/question/29459870

#SPJ2

what are all the fallacies and their meanings

Answers

Answer:

i dont know you tell me

Explanation:

When installing a processor, what must be placed between the processor and the cooler?

Answers

Answer:

Apply thermal paste to your new CPU Your CPU should now be locked and loaded, but you can’t just put your cooler back on and call it a day.

PLEASE MARK ME AS BRAINLESS!!!!!!!


1. What is the difference between a group and a topic?

Answers

What is the difference between group and a topic ?

GroupYou can publish a comment or question to the main community feed or to a group of which you are a member. Members with a common interest can form group within the wider community to form a small community around that topic and group posts will only appear in the feeds of other group members, not in the general community feed.TopicTopic work similarly to hashtags. Use the "+" symbol to the left of the Post/Ask button to add a topic (tag) to your post or question so that it can be classified along with other related posts and topics are a way to group posts and queries with similar content, but they don’t bring everyone with the same interest together in one place and this is where the groups come in!

Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detection system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution

Answers

The  solution to the issue above is to use Virtual firewall.

What is intrusion detection prevention systems?

The Intrusion detection systems (IDS) and intrusion prevention systems (IPS) is known to be a kind of system that often look into the network of a person.

It is often set up to identify the different incidents and logging information about them, hindering incidents, and reporting any issues to security administrators.

See options below

a. Virtual firewall

b. Next-generation firewall (NGFW)

c. Appliance firewall

d. Commercial software firewall

Learn more about intrusion prevention system from

https://brainly.com/question/14284690

2. While relaxing at home, you access your school's online library to complete your homework. This is a good example of
A. teens being addicted to their phones and the Internet.
B. a lack of proper infrastructure.
C. the Internet making research and learning easy.
D. the Internet making everyday tasks easier.

Answers

most likely going to be c

Accessing the school's online library from home showcases how the Internet simplifies research and learning.

Hence, The correct option is C.

The objective of this question is to assess your understanding of the positive impact the Internet has on research and learning.

It aims to evaluate your ability to identify and analyze the benefits of accessing online libraries from home.

Accessing your school's online library from the comfort of your home is a great example of how the Internet has made research and learning more convenient and accessible.

Instead of having to physically go to the library, you can now easily access a vast amount of resources and complete your homework from the comfort of your own home.

It's a wonderful way to take advantage of the benefits that the Internet offers for education.

Hence,

Option C is correct.

To learn more about a library visit:

https://brainly.com/question/31622186

#SPJ3

What’s a good way to manage a long checklist of items to make sure nothing is forgotten?
A Write the list down three times before working on it.
B Break down larger tasks into smaller, more manageable tasks.
C Divide the list up into categories, and assign each part to individual team members.
D Convert the checklist into a GDD.

Answers

Answer:

C. Divide the list up into categories, and assign each part to individual team members.

Explanation:

Correct me if I'm wrong

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x
350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
a.
a
Select one:
Image 1 is less sharp and has a smaller file size than image 2.
O b. Image 2 is less sharp and has a larger file size than image 1.
O c. Image 1 is sharper and has a larger file size than image 2.
O d. Image 2 is sharper and has a larger file size than image 1.
Clear my choice

Answers

The true statement regarding the two (2) bitmap images is: C. Image 1 is sharper and has a larger file size than image 2.

What is a bitmap image?

A bitmap image or bitmap image file (BIF) is also referred to as a raster graphic and it is generally made up of bits or dots that are called pixels.

Additionally, it is dependent on the resolution (size) of an image file and as such it becomes blurry when enlarged.

In this scenario, image 1 would become sharper and larger in size than image 2 when the original bitmap image files are increased by 25 percent.

Read more on bitmap image here: brainly.com/question/25299426

Find the output for the following program​

Answers

Answer:

It is a mathematical function program that displays many results to a math problem. R is the result of the problem, and when X and Y are done multiplying, they then print the result of this problem. That is why it says...

Print(f"The result is {R}")

Do not mind the letter f! That is just an abbreviation for an f string, a commonly used function in Python used to make string concatenation easier.

I hope this answers your question, apologies for late notice, and have a great day!

Answer:

(R)

Explanation:

cleann approved

what dose a compress pictures command do ?

Answers

Answer: I reduces the size

Explanation: cropped areas of pictures are saved by default, which adds to the file size. If your using PowerPoint then it can reduce the file size by compressing pictures, like lowering their resolution, and deleting cropped areas.

.Write a Basic program to display first 10 natural numbers
(using IF… THEN ..ELSE (or) FOR..LOOP)​

Answers

Explanation:

CLS

x=1

For I = 1 to 10

Print x;

x = x+1

Next I

End

Answer:

Using for loop:

int i=0;

for(i=1;i<=10;i++)

{

printf(“%d”,i);

}

Using while loop:

int i=1;

while(i<=10)

{

printf(“%d”,i);

i++;

}

Using do while loop:

int i=1;

do

{

printf(“%d”,i);

i++;

}while(i<=10);

what is human computer interaction​

Answers

Explanation:

Human computer interaction is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answer:

It is the way humans interact with computers; interfaces, special effects, icons, and buttons, it does not end there. HCI can also be looked at as a study to see what [person] will do with the computer.

For what was the simulation game, America's Military, used?

Answers

America's Army, army training simulator and electronic game used for army recruitment and training. It was created in 2002 by Lieut.

If there are cyber threats and vulnerabilities to your system, what does that expose you to ?


Answers

Answer:

It introduces the possibility of hackers or attackers targeting your system.

I hope this answers your question!

Different between barcode reader an

Answers

Different between barcode reader an


Explanation: not enough info

please help me with this. this my past homework and it's already stressing me out ehehe so it would make me happy if someone helped me :DD , please help me with atleast 5? thank you sm!​

Answers

Answer:

14. editor

8. managers

12. news

5. nameplate

10. dummy

Python 4.5 code practice

Answers

Answer:

"Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:"

"#1: you entered _____"

"When DONE is entered, the total number of words entered should be printed in this format:"

"A total of ___ words were entered"

count = 0

data = input('Please enter the next word: ')

while data != "DONE":

   count = count + 1

   print("#" + str(count) +": You entered the word " + data)

   data = input("Please enter the next word: ")

   

print("A total of "+ str(count) + " words were entered.")

Explanation:

we are counting starting from 0 when the user inputs a word the code then counts the word and stores is as data and continues until the user inputs DONE

What type of program would you use to create a personal budget?

Answers

Answer:

using Excel is the easiest way to create and use a budget, based on the formulas you can create to have the budget do the work for you, instead of vice versaExplanation:

A hexadecimal input can have how many values

Answers

Answer: Unlike the decimal system representing numbers using 10 symbols, hexadecimal uses 16 distinct symbols, most often the symbols "0"–"9" to represent values 0 to 9, and "A" to "F" (or alternatively "a"–"f") to represent values from 10 to 15.

Explanation:

You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing something sneaky on the company's employee portal and has authorized you to hijack his web session so you can investigate.

Your task is to hijack a web session as follows:

a. On IT-Laptop, use Ettercap to sniff traffic between the employee's computer in Office1 and the gateway.
b. Initiate a man-in-the-middle attack to capture the session ID for the employee portal logon.
c. On Office1, log in to the employee portal on rmksupplies using Chrome and the following credentials: Username: bjackson Password:
d. On Office2, navigate to rmksupplies and use the cookie editor plug-in in Chrome to inject the session ID cookie. Verify that you hijacked the session.

Answers

Answer: A, it's the most professional way or C but I'd choose A

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019

Answers

The thing that will occur to the files when Sam enables the Data Deduplication Service on Windows Server 2019 is that;

A new copy of Reena's file is formed and linked with the same file name.

What is Data Deduplication?

Data deduplication is known to be a kind of method that is used to remove too much copies of data and it is known to help to lower storage capacity requirements.

This act of Deduplication is known to be one that can be run as an inline process due to the fact that the data is being written into the storage system. When data is done in a background process, it acts to remove other copies after the data has been written to disk.

Learn more about  Data Deduplication from

https://brainly.com/question/24309209

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Answers

Answer:

15 and b is 20

Explanation:

Answer:

a = 120 and b = 60

Explanation:

a++ means a = a+1

b*=a is the same as b= a*b

After plugging in the variables,

Here are the results in order:

a = 6;

b = 60;

a = 120;

We only keep the nearest declared value of the variable, so "a" would equal 120 and "b" would equal 60.  

drawing experiences in high school

Answers

We did the following

Turn Your Markers into Paint.
Stuffed Animal Drawings.
Drawing the Human Form.
Digital Drawing Ideas.
Visual Journaling Ideas.
Line Drawing Lessons.

To prevent information from getting into the wrong hands, _____ measures are necessary. Select 2 options. extreme extreme spyware spyware threat threat physical security physical security digital security

Answers

Answer: physical security and digital security

Explanation:

Physical security and digital security are the two measures necessary to prevent information from getting into the wrong hands.Therefore, the correct options are C and D.

What is physical and digital security?

Physical security involves securing physical access to places where sensitive information is stored or processed, such as data centers, server rooms, or offices. This can include measures such as access control systems, surveillance cameras, and security guards.

Digital security involves securing digital access to sensitive information, such as passwords, encryption, firewalls, and antivirus software. These measures protect against unauthorized access, hacking, and other digital threats.

Extreme spyware and threat are not measures that would prevent information from getting into the wrong hands.Therefore, the correct options are C and D.

Learn more about physical and digital security, here:

https://brainly.com/question/22440462

#SPJ3

The question is incomplete, but most probably the complete question is,

To prevent information from getting into the wrong hands, _____ measures are necessary. Select 2 options. \

A. extreme spyware

B. threat

C. physical security

D. digital security

Which of the following are advantages of automatic updates?

They protect against viruses.

They protect against hackers.

They provide free software for your computer.

They keep your computer running at peak performance.

Answers

Answer:

They keep your computer running at peak performance.

This is the correct answer.

Answer:

A, B, and D

Explanation:

did and got correct

write down same applacations of AI in agrilcaltural health education and bussness​

Answers

Answer:

Crop and soil monitoring.

Insect and plant disease detection.

Livestock health monitoring.

Intelligent spraying.

Automatic weeding.

Aerial survey and imaging.

Produce grading and sorting

Other Questions
Explain the ins and outs of tent camping and RV camping.Which is the best evaluative thesis for the prompt?O There are advantages and disadvantages to staying in a tent or camper when enjoying the outdoors.o I tent camped when I was younger but switched to an RV when I got older.O One night in a tent brings you closer to nature than a week in a camper ever could.O Most campgrounds separate R*'s and tents because of space, ground cover, and noise considerations. NEED HELP ASAP WILL MARK BRAINLIEST Read the following scenario and answer the questions. Your manufacturing company incurs several costs to make the finished product, which are cans of eco-friendly paint. You purchase 100 empty cans at $2.00 each and 200 labels for the cans of paint at $1.00 each. You have two employees who bottle the paint into the cans and one additional employee who places a label on each can. You take a printout from your clock where the employees have entered their time and find that the wages due to these three employees is $2,000.00. You must also pay payroll taxes in the amount of $140.00 total for these three employees. A number of other costs incurred must be taken into consideration as well: depreciation on the factory machine of $150.00, utilities of $200.00, prepaid insurance of $600.00, and property taxes on your building of $2,000.00. Prepare the journal entries to record the purchase of the raw materials, the labor incurred, and the overhead incurred. Assume that $100.00 of the raw materials and $1,000.00 of the indirect materials were used. Prepare the journal entries to assign these materials to the jobs and overhead. Of the $2,140.00 in factory labor, $500.00 was attributed to indirect labor costs. Prepare the journal entry to assign the labor to jobs and overhead. You determine that direct labor cost is the activity base for determining the predetermined overhead rate. The following information is known about the estimated annual costs: overhead costs: $18,000.00 direct labor costs: $25,000.00 What is the predetermined overhead rate? What is the journal entry to assign overhead to jobs? Prepare the journal entry to transfer costs to Finished Goods. A sale of the goods takes place. The goods are sold for $5,000.00. Prepare the journal entry to record this sale. Lisez la phrase suivante. Quel verbe ou quels verbes dcrivent des actions interrompues par une autre action?Les Martin marchaient dans les rues de Vieux Qubec quand ils ont entendu de la musique et ils ont vu le dfil du Carnaval.marchaientont entenduont vuquand 1 / sec^2x + 1 / csc^2x = 1 I need help verifying the trig function with steps. Which of the following is the boiling point of water in degrees Celsius?A.32B.0C.212D.100 What is the distance between (9, 6) and (10, 6) ?Enter your answer in the box. What is the value of x in this triangle ? Find the derivative of the function. f(x) = (tan5(x) + 2)^2 Why did the Bolsheviks get caught up in a civil war after WW I? Students in Mr. Jameson's Science class measured the height of 4 sunflowers. The sunflowers measures 36 inches, 42 inches, 44 inches and 60 inches tall. Find the mean absolute deviation of the heights of the sunflowers. Show your work in the box Physiological adaptations in organisms are slow to develop and do not cause a Change in the organism true or false A cloud directly above you is about 10 across. From the weather report, you know that the cloud is at an altitude of 2200 m. How wide is the cloud? Empress suiko was the first woman ruler of which empire?. What immigrant group is represented by the alligators? How do you know? A pencil is 712 inches long.How long is the pencil in centimeters? Song randomly pulled a marble from a bag, recorded its color, put it back, and repeated. The results are shown in the following table. Color Frequency Blue 22 Green 19 Purple 20 Red 18 Yellow 21 If Song were to repeat the experiment 25 more times, how many of those times should he expect to pull a purple marble?Enter your answer as a number, like this: 42 Which of the following would cause mountains to wear down to become more like hills over time?(1 point) Erosion that carries small rock pieces and sediments away. A: Erosion that carries small rock pieces and sediments away. B: Volcanic eruptions that cause magma to flow over the edge. C: Deposition that carries new sediments to the slopes. D: Weathering that causes the peaks to become steeper. Can somebody give me answers for these two questions. Simplify Expression:3b+8b+9b A retailer had the following information: 30 November 2019 Inventory on hand at cost (incl. VAT) R17 250 R13 800 December 2019 Sales (at cost plus 25% December 2019 Purchases at cost (incl. VAT) mark-up) (incl. VAT) R18 400 The estimated cost of inventory to be shown on the retailer's statement of financial position as at 31 December 2019 is?