Which statement most accurately differentiates between engineers and scientists? Engineers are in constant search of more knowledge and research; scientists are always driven to solve problems using technical innovations. Engineers explore theoretical solutions; scientists apply practical knowledge to all situations. Engineers explore basic human needs; scientists do not need to know about basic human needs. Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.

Answers

Answer 1

Answer: Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.

Explanation:

Answer 2

Answer:

c

Explanation:


Related Questions

15. The legal right to control the
production and selling of a book, play,
film and software is known as
A. Production right
B. Copyright
C. Trade mark
D. Patent​

Answers

the correct answer copyright

Answer:

I believe the answer is copyright

Explanation:

Which inventor developed a method through which groups of people, instead of just
individuals, could view films at the same time?
Al Jolson
Robert Paul
Edwin S. Porter
Thomas Edison

Answers

Answer:

Thomas Edition is the inventor developed a method through which groups of people instead of just individuals,could view films at the same time.

Hope it will help you

Answer:

B: Robert Paul

Explanation:

edg2021

It is not Thomas Edison. He created the Kinetoscope that allows for individuals to watch, "The British inventor, Robert William Paul, expanded on Edison’s Kinetoscope parlors with his film projector, enabling theaters to display movies for groups instead of individual viewing"


Wi-fi works by converting data signals into which of the following?

Answers

Answer:

Radio waves

Explanation:

Wi-fi works by converting data signals into radio waves.

What is WI-Fi?

Wi-Fi is a family of network protocols which is wireless based.

Wi-Fi are generally used for local area networking of devices and Internet access. It allows nearby digital devices to exchange data by the help of radio waves.

Hence, Wi-fi works by converting data signals into radio waves.

Learn more about Wi-Fi.

https://brainly.com/question/13267388

#SPJ2

Samantha was working on a Word document and the horizontal and vertical margins disappeared. Which solution will fix the problem? Close the Word document and reopen it. Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen. Double-click in the ruler area to redisplay the ruler. Click on the View Ruler button located at the top left-hand side of the screen that looks like an L.​

Answers

Answer:

B

Explanation:

Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen is the solution will fix the problem. Hence, option B is correct.

What is MS Word DOC?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional caliber. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

Microsoft Word documents can be opened and edited in Docs. Even better, you may download your document as a Word document with a typical Word extension. But Docs also allows you to export other file types.

It is simple to modify huge sections of text, alter the flow between pages, change font sizes and styles, and perform other operations with Word and the DOC format.

Thus, option B is correct.

For more information about MS Word DOC, click here:

https://brainly.com/question/9174181

#SPJ2

Which step is done first to replace existing text in a text box?
•Select the text to be replaced.
•Type new text into the text box.
•Click and drag the text to replace.
•Click an area outside the text box.

Answers

The step is done first to replace existing text in a text box is to  Select the text to be replaced.

What is a text box used for?

A text box is known to be a tool or an object that a person can add to their document and it is the one that p[permits one to lets add type text anywhere in one's file.

Note that based on the above, The step is done first to replace existing text in a text box is to  Select the text to be replaced.

Learn more about text box from

https://brainly.com/question/26372855

#SPJ1

Answer:

A. Select the text to be replaced.

Explanation:

hope this helps :)

Multiple Choice
Which of the programs below will result in the following output?
Hours
8
85
10
Total
26.5

Answers

Answer:

print("Hours")

print(8)

print(8.5)

print(10)

print("Total")

print(8 + 8.5 + 10)Explanation:

Answer:

A

Explanation:

A consumer is the name for:
A. A person who buys and uses products and services
B. A product or service that a person purchases.
C. The person who sells goods and services to others.
D. Goods and services sold via the internet.

Answers

Answer:

A. a person who buys and uses products and services

A. A person who buys and uses products and services.


Ethernet network.  Your job is to decode it and answer the below questions. 
SEARCH:  Hex to ASCII converter
Copy the code below and paste into the Hex Code section.
Copy the converted code and paste underneath where it says <Insert>
d4 a9 28 06 f0 43 50 7b 9d e4 db e1 08 00 45 00
03 2f 4b 9d 40 00 80 06 62 cc c0 a8 01 bb 83 f7
03 05 de 92 00 50 62 72 96 9e c8 61 7b 5f 50 18
01 00 c9 cf 00 00 47 45 54 20 2f 7e 6b 63 68 72
69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68 74
6d 6c 20 48 54 54 50 2f 31 2e 31 0d 0a 48 6f 73
74 3a 20 77 77 77 2e 63 73 65 65 2e 75 73 66 2e
65 64 75 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a
20 6b 65 65 70 2d 61 6c 69 76 65 0d 0a 43 61 63
68 65 2d 43 6f 6e 74 72 6f 6c 3a 20 6d 61 78 2d
61 67 65 3d 30 0d 0a 55 70 67 72 61 64 65 2d 49
6e 73 65 63 75 72 65 2d 52 65 71 75 65 73 74 73
3a 20 31 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a
20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 
6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57
69 6e 36 34 3b 20 78 36 34 29 20 41 70 70 6c 65
57 65 62 4b 69 74 2f 35 33 37 2e 33 36 20 28 4b
48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f
29 20 43 68 72 6f 6d 65 2f 36 38 2e 30 2e 33 34
34 30 2e 31 30 36 20 53 61 66 61 72 69 2f 35 33
37 2e 33 36 0d 0a 41 63 63 65 70 74 3a 20 74 65
78 74 2f 68 74 6d 6c 2c 61 70 70 6c 69 63 61 74
69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 2c 61 70

70 6c 69 63 61 74 69 6f 6e 2f 78 6d 6c 3b 71 3d
30 2e 39 2c 69 6d 61 67 65 2f 77 65 62 70 2c 69
6d 61 67 65 2f 61 70 6e 67 2c 2a 2f 2a 3b 71 3d
30 2e 38 0d 0a 41 63 63 65 70 74 2d 45 6e 63 6f
64 69 6e 67 3a 20 67 7a 69 70 2c 20 64 65 66 6c
61 74 65 0d 0a 41 63 63 65 70 74 2d 4c 61 6e 67
75 61 67 65 3a 20 65 6e 2d 55 53 2c 65 6e 3b 71
3d 30 2e 39 0d 0a 43 6f 6f 6b 69 65 3a 20 5f 5f
75 74 6d 61 3d 31 31 38 36 31 39 32 37 37 2e 31
37 34 32 37 37 36 38 33 30 2e 31 35 33 34 36 34
34 39 36 33 2e 31 35 33 34 36 34 34 39 36 33 2e
31 35 33 34 36 38 38 34 35 35 2e 32 3b 20 5f 5f
75 74 6d 7a 3d 31 31 38 36 31 39 32 37 37 2e 31
35 33 34 36 38 38 34 35 35 2e 32 2e 32 2e 75 74
6d 63 73 72 3d 63 73 65 65 2e 75 73 66 2e 65 64
75 7c 75 74 6d 63 63 6e 3d 28 72 65 66 65 72 72
61 6c 29 7c 75 74 6d 63 6d 64 3d 72 65 66 65 72
72 61 6c 7c 75 74 6d 63 63 74 3d 2f 7e 6b 63 68
72 69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68
74 6d 6c 3b 20 5f 5f 75 74 6d 74 3d 31 3b 20 5f
5f 75 74 6d 74 5f 61 63 63 6f 75 6e 74 32 3d 31
3b 20 5f 5f 75 74 6d 62 3d 31 31 38 36 31 39 32
37 37 2e 34 2e 31 30 2e 31 35 33 34 36 38 38 34
35 35 0d 0a 49 66 2d 4e 6f 6e 65 2d 4d 61 74 63
68 3a 20 22 31 37 61 39 2d 35 37 33 35 34 61 35
33 39 30 31 33 65 22 0d 0a 49 66 2d 4d 6f 64 69
66 69 65 64 2d 53 69 6e 63 65 3a 20 4d 6f 6e 2c
20 31 33 20 41 75 67 20 32 30 31 38 20 31 37 3a
34 34 3a 32 39 20 47 4d 54 0d 0a 0d 0a 

<INSERT>
a) What is the Ethernet destination and source address (in hex)? 
b) Identify the vendor of the equipment of the source?
c) What is the protocol type (in the Ethernet header)? 
d) What version of IP is this? 
e) What are the IP destination and source addresses (give in proper dotted decimal notation)? 
f) Identify if the transport protocol is TCP or UDP.
g) What are the transport protocol destination and source port numbers (in decimal)? 
h) What is the application protocol (be sure to give the version number)? 
i) What is the function being performed at the application layer (that is, what is the purpose of
this packet)? 
j) What are the checksum values for all protocols that have a checksum in this packet? Note
that a CRC is not a checksum.

Answers

ang gulo po pede po ba pa picture thank you po.

Which is true regarding pseudocode?
O It uses simple words and symbols to communicate the design of a program.
O It compiles and executes code.
O It expresses only complex processes.
O It gives a graphical representation of a set of instructions to solve a problem.

Answers

Answer:

The answer is A it uses simple words and symbols to communicate the design of a program.

Explanation:

Science Stuff

The true regarding pseudocode is it uses simple words and symbols to communicate the design of a program. The correct option is a.

What is pseudocode?

Pseudocode is a simple language description of an algorithm or other system's processes used in computer science. Although pseudocode frequently employs standard programming language structure rules, it is written for humans rather than automated comprehension.

In the field of computer science, a pseudocode is a linguistic description of an algorithm's steps. They consist of text-based components and are simple. Informally expressing concepts and techniques during the development process is known as pseudocoding.

Therefore, the correct option is a, It uses simple words and symbols to communicate the design of a program.

To learn more about pseudocode, refer to the link:

https://brainly.com/question/17442954

#SPJ6

Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
destination. Other applications work fine. What might you suspect is happening?
a) The Network connection is broken
b) the network is experiencing latency
c) firewall is blocking that application
d)data loss is occurring due to network congestion

Answers

Answer:

Firewall is blocking that application.

Explanation:

i got it right on the test and i hope yall have a great day :3

Answer:

FIREWALL

Explanation

i did it on edj

Nathan notices his computer System is slowing down when he tries to copy documents to it he also gets a prompt I warned him that the system is running low on storage space which hardware device should he consider upgrading in order to increase the system storage space?

Answers

Answer:Hard drive or Solid State drive

Explanation:

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

How do you respect a person's gender identity? *

Answers

You call them exactly what they choose to be identified by it doesn't matter what gender they were born as if they want to be something else that is their choice and they may do as they like.

Conversion Practice: Find the equivalent binary or decimal numbers below. Binary Decimal Binary Decimal 100 5 101 17 1101 63 0001 1111 64 0010 0000 127 1010 1010 256 1111 1111 513

Answers

Explanation:

Binary --> Decimal

100 --> 4

101 --> 5

1101 --> 13

0001 1111 --> 31

0010 0000 --> 32

1010 1010 --> 170

1111 1111 --> 255

Binary <--> Decimal

101 <--> 5

0001 0001 <--> 17

0011 1111 <--> 63

0100 0000 <--> 64

0111 1111 <--> 127

0001 0000 0000 <--> 256

0010 0000 0001 <--> 513

what is the full form of flops​

Answers

Answer:

Floating Point Operations Per Second (FLOPS)

Explanation:

Floating Point Operations Per Second (FLOPS) is a measure of a computer’s performance, especially in fields of scientific calculations that make heavy use of floating-point calculations. Floating-point operations include any operations that involve fractional numbers.

Answer:

Floating Point Operations Per Second

List inputs to a technological system

Answers

The seven inputs to a technological system are people, materials, tools and machines, energy, information, finances, and time.

Enhancing personal identity is often a factor in making a career choice

Answers

Yes, they ask for your sex & race on many applications. Depending on the person, you may not get the job depending on the person and their standards. It’s reality.

how many types of fundamental movement are there

Answers

Answer:

12

Explanation:

To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities and commitments. allow the same amount of time each day for studying. budget periods of time to study daily, even if it is interrupted.

Answers

Answer:

B) write down all activities and commitments

Explanation:

It seems the most logical.

Write down all activities and commitments.

What is Commitments?

An planned schedule describing study periods and learning objectives is called a study plan.

College students should create a calendar that allots specific time each week for studying, much like with work or school schedules. The dates of the quizzes, tests, and exams should be included in this plan, as well as the due dates for the papers and projects.

It can be hard to manage your time. You most certainly have obligations outside of school, such as work, extracurricular activities, and social events.

Therefore, Write down all activities and commitments.

To learn more about commitments, refer to the link:

https://brainly.com/question/13864456

#SPJ6

Which correctly lists the two elements that make up the empty space in the universe? ice and debris debris and dark matter dark matter and dark energy dark energy and dust

Answers

Answer:

The answer is "dark matter and dark energy and dust".

Explanation:

In the empty room, the universe is gases and ashes. Even though humans think the exterior universe's blank space is nothing more than empty.  Fortunately, the plasma form of its hydrogen and helium gases, including the various types of dirt and debris, occupy this void vacuum.  There are also several other materials however these greenhouse gases and dust particles are also the bulk of the material.

Answer:

c

Explanation:

Which option offers predesigned formatting and design elements to facilitate the process of creating a document?
A.
themes
B.
templates
C.
design
D.
layout

Answers

Answer:

The answer is B, templates

Explanation:

Answer:

B. templates

Explanation:

Question #1
Multiple Select
Before you write a computer program, what can you use for planning? Select 2 options.
O pseudochart
O pseudocode
flowplan
flowcode
flowchart

Answers

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

(BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a reality?

Answers

Answer:

Internet of Vehicles (IoV) is a concept in intelligent transportation systems (ITS) in which vehicles with IoV will be able to communicate with each other and [ublic networks through V2I (vehicle-to-infrastructure), V2P (vehicle-to-pedestrian) interaction, and V2V (vehicle-to-vehicle).

There are some challenges that will need to be overcome in order for the Internet of Vehicles to become a reality:

IoV is unable to predict human behavior and body language of other drivers so it can be dangerous sometimes to take respective actions that a normal vehicle driver can do. Risk of security challenges and security attacks is one of the biggest challenges as the networks can be manipulated.People have lack of trust in IoV due to privacy and health concern.The initial cost of IoV is very high that only few rich people can buy it.

In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
100,000
1 billion
1 million
1000

Answers

Answer:

The correct answer is D) 1 Million

Explanation:

It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.

Cheers!

Which of the following is not an operating system
A.LINUX
B.MAC OS
C.NEXUS
D.WINDOWS

Answers

Answer:

C

Explanation:

I hope this helped.

Answer:

I honestly don’t know... But I’m still gettin that credit Broski

Explanation:

PLEASE HELP!! Which of the following computing devices would best address the needs for a CYBER SECURITY ANALYST?

Answers

Answer:high end laptop.

Explanation:

24. A key on a keyboard of a computer
has two symbols on it, top and down.
Which of the following procedures will be
appropriate to use to get the top key?
A. Hold down the Shift key and
press the identified
B. Hold down the Alt key and
press the identified key
C. Hold down the Ctrl key and
press the identified key
D. Hold down the Del key and
press the identified key​

Answers

Answer:

Its A

Explanation:

.................

What is the origin of the name “breadboard”?

Answers

Answer:

Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.

WILL GIVE BRAINLIEST!!!!!!!!
Trade-offs are the moral principles and values that guide conduct within a group of people.


Group of answer choices


True


False

Answers

yes trueso true true true

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

Other Questions
Why does Tom hit Myrtle at his apartment in New York City?A) Because she refuses to see him anymoreB) Because she asks him to divorce his wifeC) Because she taunts him about DaisyD) Because she flirts with Nick Loeffler Company owns 35% of the common stock of Tetter Co. and uses the equity method to account for the investment. During 2021, Tetter reported income of $260,000 and paid dividends of $90,000. There is no amortization associated with the investment. During 2021, how much income should Loeffler recognize related to this investment Can anybody help me What is an ionic bond ? How many liters each of a 30% acid solution and a 50 % acid solution must be used to produce 70 liters of a 40 % acid solution? (Round to two decimal places ifnecessary.) Which approach describes how leaders act? a. Trait. b. Skills. c. Leader-member exchange. d. Behavioral use the distributive property to find the sum of 112+68 Dangers in the WorkplaceLook at the photo. What dangers were these childworkers exposed to? Identify at least threeproblems you see. Read each statement about density and convection and indicate whether it is True or False _____ 1. Density is how tightly packed particles are in a substance. _____ 2. Warm liquid sinks and cool liquid rises. _____ 3. Heat moves through solid, liquid, and gases through convection currents. _____ 4. Substances with a greater density than water will sink, while substances with less density will float. PLZ ANSWER In the U.S. about 48 million suffer from food-borne illnesses every year. "the product of a number and 4" if f(x)=2x^2-5and g(x)=5x+7findg(f(x))=___x^2+___ Help on this ASAp and TY please help me out ! I am stuck difference between compound and element Three girls-- Kali, Annie, and Xiaoling -- go on a trip with their youth orchestra. The three girls share the cost of the hotel. The bill comes to $295.48. It includes $13.25 for some food that Annie orders and $14.00 for cleaning Xiaoling's uniform. What is the dollar amount of each girl's share of the hotel bill? 9) 1 = 0.99 + z? 10 What stores energy for long term use and is a structural component of cell membranes Which expression is equivalent to 25 x 1/5? The Albany Congress was notable because