Match the following.
a. Temperature - Barometer
b. Atmospheric pressure - Anemometer
c. Wind direction - Hygrometer
d. Wind speed - Wind wane
e. Humidity -Thermometer

Answers

Answer 1

Answer:

Read the explanation for the answer :D

Explanation:

Temperature - Theremometer

Atmospheric pressure - Barometer

Wind direction - Wind wane

Wind speed - Anemometer

Humidity - Hydrometer

Hope this helped! :D Please mark me brainliest!


Related Questions

WILL CHOOSE BRAINLIEST! in cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multiply the number of shares in column B by the price of the shares in column C.

Answers

Answer:

Alice Grant has been saving and investing part of her salary for several years. She decides to keep track of her investments on a worksheet. The file Application 9-7 contains the investments of Alice Grant. She owns several types of investments:

Explanation:

Describe the installation process for printers and scanners identify possible malfunctions relating to this installation process

Answers

Answer:

Plug it is in the right slots  add as brainlyest please

Explanation:

PYTHON 3


PART 1


Given the following list of the first 20 elements on the periodic table of elements:


elements20 = ['Hydrogen', 'Helium', 'Lithium', 'Beryllium', 'Boron', 'Carbon', 'Nitrogen', 'Oxygen', 'Fluorine', 'Neon', 'Sodium', 'Magnesium', 'Aluminum', 'Silicon', 'Phosphorus', 'Sulfur', 'Chlorine', 'Argon', 'Potassium', 'Calcium']


Print the list

Go through (traverse) the list item by item and do the following:

Print the atomic number - element name for any element that starts with an 'H' or an 'N'. For example 1 - Hydrogen would be printed for the first element.

(Hint: How does the index number compare to the atomic number?)

Print the list in alphabetical order (ascending)

Print the list in reverse alphabetical order (descending)

Go through (traverse) the list item by item and do the following: (HINT: Be careful of the order you go!)

Remove any elements that start with the letter 'C'

Print the resulting list with the 3 'C' elements removed.

PART 2


For this little program you will create a list of numbers and then perform some actions on it.


Ask the user to enter 2 digit positive numbers repeatedly until they enter a -1. Make sure that they only enter positive 2-digit numbers.

Display the list of numbers, count, total, maximum, minimum and average of the numbers after the user enters -1.

Display the sorted list of numbers.

Define and call a function that will display the median of the list of numbers. It will take the list as a parameter and return the median value. (You will need to consider if the number of numbers is odd or even.)

The output should look something like this:

PYTHON 3PART 1Given the following list of the first 20 elements on the periodic table of elements:elements20

Answers

Answer:

c

Explanation:

agree i go with c btw i took test

Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?

A.
Creative Commons

B.
word processing program

C.
Weebly

D.
web-based publishing software

Answers

The BEST type of program for Anthony to use to create the items he needs for his business are  word processing program.

What is the word processing program?

Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.

To learn more about  word processing program.

https://brainly.com/question/14718387

#SPJ1

Software program to creat edit and other things of that matter

is this a scam pls tell me????????????/

is this a scam pls tell me????????????/

Answers

Yes don't trust at all, I've got that so many times

Oh lord yes it is a huge scam

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols

Answers

A way to store a sequence of letters, numbers or symbols.

This is the most accurate statement, though not entirely true.

Hope this helps.

A way to store a sequence of letters, numbers, or symbols but it’s not always true!

can someone help me im using python IDLE and im getting this message in the output what does this mean "Error: unindent does not match any outer indentation level"

Answers

Answer:

Indent the first line

Explanation:

In many types of coding, the process does not work until you indent the first line. If it is a few rows in programs such as loops many more indentations maybe needed.

Answer:

Indent the first line

Explanation:

In many types of coding, the process does not work until you indent the first line. If it is a few rows in programs such as loops many more indentations maybe needed.

explain the history of computing of mechanical era

Answers

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

Why does my brainliest keep going down when I didn't use any? I had 7 but now I have 4.

Answers

Answer:

Explanation:

because ur posting this quastion and the more u post the more ur points go down

Answer:

The questions that you got brainliest on might have been deleted.

Explanation:

Which changes the natural world?
technology
science
prototypes
feedback

Answers

it would be technology,
Its personally my opinion.
So i think its technology… :)

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Objective(s): In your own words, what was the purpose of this lab? Hypothesis: In this section, please include the if/then statements you developed during your lab activity. These statements reflect your predicted outcomes for the experiment. If predators are increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. If pollution is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. If the amount of food available is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. Procedure: The procedures are listed in your virtual lab. You do not need to repeat them here. Please be sure to identify the test variable (independent variable), outcome variable (dependent variable), and control group for this experiment. Reminder: The test variable is the item that is changing in this investigation. The outcome variable is the item that you are measuring in this investigation. The control group is the group in the experiment where the factors being tested are not applied. It allows scientists to set a baseline to compare the experimental groups that do have factors applied to them. Test variable (independent variable): Outcome variable (dependent variable): Control group: Data: Record your data from each trial in the data chart below: Type of Factor Beginning Frog Count Simulation 1 (Low) Simulation 2 (High) Predators (alligators) Pollution Food (mosquitoes) Graphs Use the graphs you printed from the data chart in the virtual lab and analyze the data. Make a note of any trends that you discover. Predators (alligators): Pollution: Food (mosquitoes): Conclusion: Your conclusion will include a summary and an interpretation of the lab results. Please write in complete sentences. Which limiting factor(s) in this lab simulation are biotic? Which limiting factor(s) in this lab simulation are abiotic? Which limiting factor

Answers

Answer:

the amount of food available is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years

Explanation:

because it makes sense

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

what are some steps Hector could have taken to ensure that his photographs were not ruined near the end of the shoot?

Answers

Answer:

make several extra copies of the pictures and frame them right away if they're printed out.

Explanation:

Answer:

make several extra copies of the pictures and frame them right away if they're printed out.

Explanation:

3. What elements related to the release and success of the NES console do you see in modern console releases? What elements are no longer relevant to modern console gaming?

Answers

Answer:

the main thing that made the NES console amazing was the detication. For example Mario has 20+ games with his name in the title. This shows how focused a company was on their main character.

Explanation:

The pre-built JavaScript function that provides the date and time is called:

A.
Now.

B.
Date.

C.
Time.

D.
DateTime.

Answers

Answer: The answer is B.

Explanation: Acording to the JS documentation that's the class where you can get that information as well as invoke other methods such as `now()` and `getTime()` on.

b is the answer date

reasons phone doesnt charge

Answers

Here are 5 reasons possibly why:

1.) Faulty lightning or micro USB port

2.) The lightning or USB port could be dirty

3.) Damaged charging port or cable

4.) Water Damage

5.) Software problems

One example could be that the charging hole is full of dirt and dust.

The "c" key and the "e" key are struck by
1. left middle finger
2. left index finger
3. right index finger
4. right middle finger

Answers

1 because when you type on the home row your left middle finger will hit both of those letters.
they are stuck by the left index finger

Do you guys know the once social media app Six Degrees? If so, was it only in the US?

Answers

Answer:

Six Degrees, (created by Andrew Weinrein) wasn't used outside of the United States. It was shut down in July 2009 because it was unsuccessful.

Happy late Halloween

What does a loop statement do?

It causes a section of code to be repeated a certain number of times.

It causes a section of code to be executed one time only.

It causes a section of code to end.
It causes a section of code to be repeated infinitely.

Answers

Answer:

It causes a section of code to be repeated infinitely

Answer:

It causes a section of code to be repeated a certain number of times.

Explanation:

Can anybody give me any suggestions to what my pfp should be

Answers

Answer:

— Your profile picture can be one of the most important elements of ... but your photo should give candidates a clear idea of what you'd ... They might also help to direct you a bit, like telling you to tilt your head slightly or tuck your ...

Explanation:

Answer: here are my suggestions

1.wolves

2.cars

3.anime

4.water

5.fire

Who plays Poliblicy?

Answers

Answer:

it a game that i don't play

Explanation:

btw i just search it up

2-3=5 but I don’t play the game is

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

In 1 to 2 sentences, describe how to create a list with bullets

Answers

Answer:

To create a bulleted list:

Select the text you want to format as a list.

On the Home tab, click the drop-down arrow next to the Bullets command. A menu of bullet styles will appear.

Move the mouse over the various bullet styles. ...

The text will be formatted as a bulleted list.

Explanation:

~Hope this helps

Answer:

the person above is correct i got 100% give him brainly Est

Explanation:

What will be the value of number after this code is finished executing?

for i in range(100):

number = 0

A.
100

B.
0

C.
1

D.
i

Answers

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

Learn more about code on:

https://brainly.com/question/26134656

#SPJ1

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

ANSWER ASAP GIVING BRAINLIEST!

A mathematical calculation based upon the data in a spreadsheet is called a

A: Factor
B: Formula
C: Function
D: Factor
E; Equation

Answers

Answer:

B: Formula

Explanation:

Formula. An equation that performs mathematical calculations on values in a worksheet. Number values. Constant values consisting of only numbers. Cell address.

A mathematical calculation based upon the data in a spreadsheet is called a B: Formula.

What is the formula?

In Microsoft Excel, a component is an expression that operates on values in quite a number of cells. These formulations go back a result, even if it's miles an error. Excel formulation allows you to carry out calculations along with addition, subtraction, multiplication, and division.

A spreadsheet is a software program software you operate to without problems carry out mathematical calculations on statistical facts and totaling lengthy columns of numbers or figure out probabilities and averages.

Read more about the formula:

https://brainly.com/question/657646

#SPJ2

Other Questions
I. EED HELP FAST, IS FOR A TEST!!!!At a coffee shop, the first 100 customers'orders were as follows.SmallMediumLargeHot54822Cold8125What is the probability that a customer ordereda medium given that he or she ordered a colddrink?Rounded to the nearest percent, [? ]% Explain one way the students can adjust the track to increase the marble's potential energy. In your explanation,describe the dimensions of any materials used to adjust the track andexplain why the adjustment to the track would increase the marble's potential energy. which of the following statements about organelles is true How does bobbies walk to the railway station help build suspense in the plot the benefits of economic development under colonial rule accrued fairly evenly to colonial peoples and european wage laborers, as well as banks and import-export firms in europe. true or false Parallelogram RSTU is rotated 180 clockwiseabout vertex R. How many pairs of parallelsides does the rotated figure have? 8. What is republican motherhood and how did it impact the role of women in society? pis help me NOW Which are mediums that sound waves can travel through? (Select all that apply.) the air in your bedroom the ocean a wooden wall outer space What is the greatest possible quotient of any two distinct members of the set $\left\{\frac{2}{5}, \frac{1}{2},5,10\right\}$? Specifically, we wish to maximize $\frac{x}{y}$, where $x$ and $y$ are chosen from the previous set. marketers can classify business-to-business buying situations into three general categories: multiple choice new buy, repeat purchase, and modified purchase. new buy, straight rebuy, and modified rebuy. My question is in the picture, someone please answer it. In September, an airline using accrual accounting received cash from a round-trip ticket sold to a customer for $1,500 The ticket allowed the customer to fly from Denver to Hawail in October and from Hawaii back to Denver in November. When should the airline recognize the revenue? 1. Only in September 2. Only in November 3. In September, October and November 4. In October and November Some people argue that harsh punishments (capital punishment, life sentences, orancient punishments like cutting off a hand for stealing) for criminals will reduce crimerates. Do you think that harsh punishments reduce crime? Why or why not? music is short and simple Homework: HW8 Question 2, Problem 12.25 Part 1 of 2 HW Score: 79.71%, 55 of 69 points O Points: 0 of 4 Save Rocky Mountain Tire Center sells 9,000 go-cart tires per year. The ordering cost for each order is $35, and the holding cost is 50% of the purchase price of the tires per year. The purchase price is $21 per tire if fewer than 200 tires are ordered. $19 per tire if 200 or more, but fewer than 8,000, tires are ordered, and $17 per tire 8,000 or more tires are ordered. a) How many tires should Rocky Mountain order each time it places an order? Rocky Mountain's optimal order quantity is units (enter your response as a whole number). Last Wednesday, students could choose ham or turkey sandwiches for lunch. The cafeteria made 120 sandwiches in all, 30% of which were turkey. How many ham sandwiches did the cafeteria make?A. 84 B. 36 C. 60D. 72 Fine the equation of the line through (o, -3) perpendicular to y =4x+4 Which quote from "My Heart is Bursting most contributes to the assertive tone of Satanta's speech? which number has a 3 that is ten times greater than the 3 in 513 What is the sum of the 3rd square number and the 3rd cube number?