according to the federal geographic data committee, metadata for gis data should ideally include all of the following, except: a. financial information. b. spatial reference information. c. time period information. d. contact information.

Answers

Answer 1

Tomlinson has consequently earned the title of "father of GIS," especially for his use of overlays to further the spatial analysis of convergent geographic data.

In Canada, CGIS continued throughout the 1990s and helped create a sizable digitized land resource database. Five essential elements must be integrated for a GIS to function: hardware, software, data, people, and techniques. A GIS runs on hardware, which is the computer. GIS software is currently supported by a variety of hardware platforms, including standalone and networked desktop computers as well as centralized computer servers. The precise location of objects can be determined using global positioning systems, or GPS. GIS, or geographic information systems, are used to store data on maps. In managing land in the high hills, GPS and GIS are both helpful.

Learn more about hardware here-

https://brainly.com/question/15232088

#SPJ4


Related Questions

john wants to produce a message digest of a 2,048-byte message he plans to send to mary. if he uses the sha-2 hashing algorithm, what is a possible size for the message digest generated?

Answers

The possible size for the message digest generated is 160 bits

A cryptographically insecure hash function known as SHA-1 (Secure Hash Algorithm 1) takes an input and generates a 160-bit (20-byte) message digest hash value.

It is typically used to confirm that a file has not been altered. This is accomplished by creating a checksum prior to is transferring and also after it reaches its final destination.

No matter how big an input message is, the SHA-1 hashing algorithm always produces a 160-bit message digest. In point of fact, any secure algorithm must provide an output of a fixed length.

Learn more about the SHA-2 hashing algorithm here:https://brainly.com/question/13068609

#SPJ4

assume that the beq $6, $7, exit instruction is fetched from memory address 0x40000008 and the low 16 bits of the instruction contain the pattern 0x8345. to what 32-bit memory address must the label exit correspond?

Answers

Only one memory address is used in a load word or store word instruction. The address of a block of four consecutive bytes is stored in the lowest address of the four bytes.

A single byte's address is represented as a 32-bit address. An address is present on 32 bus wires (there are many more bus wires for timing and control). Addresses like 0x2000, which appear to be a pattern of just 16 bits, are occasionally mentioned. However, this merely serves as a shorthand for the complete 32-bit address. A maximum of 4GB of memory can be addressed by 32-bit systems in terms of random access memory. The maximum amount of memory that may be addressed by a 64-bit architecture is 16 million terabytes (TB).

Learn more about memory here-

https://brainly.com/question/28754403

#SPJ4

In the Word Online application, color schemes cannot be changed after initial setup. True Or False?

Answers

Answer:

False

Explanation:

The answer is false

Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer. An algorithm that accesses each element in the list twice an algorithm that accesses each element in the list n times an algorithm that accesses only the first 10 elements in the list, regardless of the size of the list which of the algorithms run in reasonable time?.

Answers

We have that the appropriate statement will be

An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

Generally The algorithm must traverse the listing twice in order to gain access to everything in the list twice. This results in the operations entry 2*n.

Additionally, if a given component is used n times, the list will need to be traversed n times, resulting in n2 access operations.

Each 2*n and n2 is significantly larger if n is a really large integer. Thus, this algorithm will only require ten entry-level operations and run quickly.

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

Learn more about algorithm:

https://brainly.com/question/24953880

#SPJ4

you have two hyper-v hosts, each running three vms. you want to be able to periodically perform maintenance operations on the hosts without losing the services provided by the vms. you also want to maintain vm operation in the event of a host failure. you don't have shared storage between the hosts. what is the best way to accomplish this?

Answers

To maintain VM operation in the event of a host failure when there's no shared storage between the hosts, Enable replication.

What is a hyper-v host?

Hyper-V is a hardware virtualization product developed by Microsoft intended to allow users to create and run a digital or virtual version of a computer, called a virtual machine.

Here's the complete question:

You have two Hyper-V hosts, each running three VMs. You want to be able to periodically perform maintenance operations on the hosts without losing the services provided by the VMs. You also want to maintain VM operation in the event of a host failure. You don't have shared storage between the hosts. What is the best way to accomplish this?

a. Export the VMs.

b. Implement load balancing.

c. Enable replication.

d. Use vMotion.

Learn more about Virtual Machines from:

https://brainly.com/question/23341909?referrer=searchResults

#SPJ4

The​ ________ is an advanced networking consortium representing more than 100 countries.

Answers

The​ Internet2 is an advanced networking consortium representing more than 100 countries.

The worldwide body in charge of managing and supervising the coordination of the Internet's domain name system and its distinctive identifiers, such as IP addresses, is called the Internet Corporation for Assigned Names and Numbers (ICANN). The 802.15 wireless networking protocol, which is helpful for establishing small personal area networks, is more commonly referred to as Bluetooth (PANs). Using low-power radio-based communication, it can connect up to eight devices within a 10-meter radius and transmit data at up to 722 Kbps in the 2.4-gigahertz (GHz) range. In order for all Internet users to be able to find all legitimate addresses, ICANN is in charge of coordinating the operation of the DNS's technical components.

Learn more about internet here-

https://brainly.com/question/13308791

#SPJ4

What is another name for a central processing unit?

A. Computer
B. Integrated Circuit
C. Microprocessor
D. Transistor

Answers

Answer: C. Microprocessor
It’s answer c.microprocessor

Why is abstraction usually a good practice when programming?
A. It can make the code more complex and thorough.
B. It can make the code easier to read and understand.
C. It allows the programmer to write more detailed code.
D. It allows the programmer to add more code to a program

Answers

The reason that abstraction is usually a good practice when programming is option C. It allows the programmer to write more detailed code.

Why is using abstraction in programming typically a good idea?

In a programming setting, abstraction seeks to hide as much complexity as possible so that programmers may concentrate on what's most crucial and pertinent. Due to machines' need for binary input, abstraction is employed to hide much of what is essential to making a program function.

Therefore, It aims to perfect the user interface. The programmer can use the features of programming more effectively and write better code in this way. As the feature itself is designed to hide it, it cannot make the software more complicated.

Learn more about abstraction from

https://brainly.com/question/7994244
#SPJ1

the answer is B just took the test

you have a medium-sized business of over 300 windows 10 computers and 15 windows server 2016 and 2019 servers. you have found that the computers are using a lot of bandwidth every night when they check for updates on microsoft's update servers. in addition, you have no easy way of knowing which computers are up to date with the latest security patches. what is the best way to reduce the bandwidth usage and more easily document which computers have the proper updates?

Answers

The best way to reduce the bandwidth usage and more easily document which computers have the proper updates is to install Windows Server Update Services on one of your servers.

What are Windows server update services?

Windows Server Update Services (WSUS) is a window service that can reduce bandwidth usage caused by Windows updates because only the update server has to access the Internet. Plus, WSUS can produce reports on updates.

Here's the complete question:

You have a medium-sized business of over 300 Windows 10 computers and 15 Windows Server 2016 and 2019 servers. You have found that the computers are using a lot of bandwidth every night when they check for updates on Microsoft's update servers. In addition, you have no easy way of knowing which computers are up to date with the latest security patches. What is the best way to reduce the bandwidth usage and more easily document which computers have the proper updates?

a. Download updates and burn them to a DVD, and use the DVD to install the updates on each computer. The DVD will also serve as documentation.

b. Create a script to stagger when computers perform updates and send a list of installed updates to a server.

c. Configure the computers to compress the updates they receive from Microsoft.

d. Install Windows Server Update Services on one of your servers.

Learn more Windows Server Update Services from:

https://brainly.com/question/23943500?referrer=searchResults

#SPJ4

which of the following is the best reason for dividing a program into functions? question 4 options: by subdividing a program into multiple functions, it makes the program more secure functions can make a program smaller by eliminating repetitive code increasing the number of functions in a program greatly increases the speed of the program using multiple functions reduces the possibility of code reuse

Answers

The best reason for dividing a program into functions is that functions can make a program smaller by eliminating repetitive code.

A program is divided into functions so that a program can properly be managed and integrated.

By dividing a program into functions, the repetitive codes are eliminated that not only makes the program smaller but also increases its efficacy. If we are to make a change in the program, we will only need to change it from one place rather than many places if there were repetitive codes.

Hence, the division of programs into functions helps in the proper management as well as making the program shorter by removing repetitive codes.

To learn more about programs, click here:

https://brainly.com/question/1538272

#SPJ4

prior to installing some software on your windows system, you turn off user account control (uac), reboot the computer, and install the software. you turn uac back on, but it does not prompt you before performing sensitive actions. how do you make uac protection work again?

Answers

Desktop apps that make a lot of system changes may stop working after installation when UAC is enabled. However, if you install with User Account Control enabled, it works fine.

If UAC is enabled, Windows 10 or Windows 11 will prompt for consent or valid local administrator account credentials before starting a program or task that requires a full administrator access token. display. This prompt prevents malicious software from being installed unnoticed. User Account Control (UAC) prevents malware from damaging your PC and helps businesses provide a more managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account unless an administrator explicitly grants administrator-level access to the system.

Learn more about Enabled here-

https://brainly.com/question/15320585

#SPJ4

Please help I need to turn it in 15 minutes please help

Answers

Answer:

protecting data integrity by unblocking unauthorized access.

Explanation:

hope this will

Answer:

the answer is C

Explanation:

I don't really know how to explain but it know that the answer is C

Please help asap I need to turn in

Answers

Answer:

Question 4
True

Question 5
User

Question 6
True

Explanation:

all of the following will cause a shift in the supply of wireless earbuds except part 2 a. a decrease in the number of wireless earbud manufacturers. b. an increase in the cost of producing wireless earbuds. c. a decrease in the prices of wireless earbuds. d. a​ per-unit government subsidy on the production of wireless earbuds.

Answers

Features like Active Noise Cancellation and Transparency Mode often start at $50 to $100, though you might be able to get them for less.

As a result, the amount demanded rises as price falls. Any modification or shift in the quantity demanded involves a movement of the demand curve's point, not the demand curve itself. With everything else remaining the same, an increase in demand will result in a rise in the equilibrium price and an increase in supply. Reduced demand will result in a drop in the equilibrium price and a reduction in supply. There is currently no proof in the scientific community that using wireless devices increases the risk of developing cancer or other diseases.

Learn more about equilibrium here-

https://brainly.com/question/28527601

#SPJ4

Answer:

c or d

Explanation:

launch five children. the five children should go into endless loops each child should be written so it ignores the first sigint signal it gets, but honors the second sigint it gets by terminating execution. each child should print a message to the screen identifying itself with its own pid and saying if it’s ignoring or honoring the sigint request.

Answers

An infinite loop, sometimes known as an endless loop, is a section of code that never ends since it has no functional exit.

An endless loop is a section of code that never reaches the ending condition, hence it keeps running indefinitely. our program or browser may crash or become frozen as a result of an infinite loop. It is crucial to be aware of infinite loops in order to prevent such events. If we want our script (or a section of the code) to run continuously until a particular action is taken, infinite loops can be handy. Particularly when your script or block of code can be prevented from running by more than one action. Endless loops are a typical programming construct in the event-based paradigm.

Learn more about loop here-

https://brainly.com/question/17067964

#SPJ4

which type of software provides an additional layer of protection to sensitive information that is stored in digital format, offering the capability not only to limit access to specific files or documents but also to specify the actions that individuals who are granted access to that resource can perform?

Answers

information rights management (IRM)

Information rights management (IRM) software offers the ability to limit access to certain files or documents as well as to designate the activities that people with access to that resource may take, adding an additional layer of security to sensitive information that is held in digital format.

Which kind of software offers an extra layer of security?

Any cyber security system should include antivirus software as it is frequently the first line of defense against dangerous software before it penetrates too far. It provides defense for a computer or network and aids in stopping the virus or other harmful code from infecting more devices.

To learn more about information rights management (IRM) refer to:

https://brainly.com/question/15177750

#SPJ4

Information rights management (IRM) software offers the ability to limit access to certain files or documents as well as to designate the activities that people with access to that resource may take, adding an additional layer of security to sensitive information that is held in digital format.

Which kind of software offers an extra layer of security?

Any cyber security system should include antivirus software as it is frequently the first line of defense against dangerous software before it penetrates too far. It provides defense for a computer or network and aids in stopping the virus or other harmful code from infecting more devices.

Networks, servers, laptops, mobile devices, and other devices are all protected and secured by security software against dangers like as viruses, intrusions, and illegal access. Data, people, systems, and businesses can all be protected from a variety of hazards with the use of security software.

To learn more about information rights management (IRM) refer to:

brainly.com/question/15177750

#SPJ4

Question 8 (3.34 points)
Which of these are the three main types of networking cables that you will
encounter?
A .Coaxial cables, Twisted pair cables, Fiber optics cables
B .Coaxial cables, Power Extension Cables, Fiber optics cables
C .HDMI Cables, Power Extension Cables, Fiber optics cables
D .Coaxial cables, Power Extension Cables, UV Cablees

Answers

Answer:

its b

Explanation:

hvdgjvfvyfrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrruhk

Which tab would you click to find the document protection features?
C
File
Home
References
Insert
Read Question

Answers

Answer:

File

Explanation:

You can also go to the Review tab, in the Protect group, click Protect Document, and then click Restrict Formatting and Editing.

1) has cwnd set to 8,000 bytes 2) has 4,000 bytes available in its own input buffers 3) receives a segment with an advertised window of 12,000 bytes. the tcp sender will set its offered window wnd to bytes.

Answers

The internet's fundamental building blocks, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), allow various forms of data to be transmitted from a network source to a destination.

While UDP places a higher priority on speed and efficiency, TCP is more reliable. One or more TCP packets can be created and sent to a target using the TCP mode of the Packet Generator tool. The TCP header's header flags and other fields are completely under our control. A file or text payload can be included in the packet as an additional payload. The usage of TCP allows for the secure exchange of data between the server and client. Regardless of the volume, it ensures the integrity of data delivered over the network.

Learn more about packet here-

https://brainly.com/question/13901314

#SPJ4

in all our examples of recursive thinking, the series of recursive calls eventually reached a call that did not involve further recursion that is, it reached a .

Answers

A recursion will continue to make recursive calls indefinitely if it never hits a base case, and the program will never come to an end. This is referred to as infinite recursion, and it is typically not recommended.

A program with infinite recursion won't typically run forever in most programming environments. Recursion allows us to imagine both our own and other people's thoughts. Memory is allocated for a called function on top of memory allocated to the calling function, and a new copy of local variables is created for each function call. It also endows us with the capacity for mental "time travel," which allows us to bring past or hypothetically future experiences into the present.

Learn more about recursion here-

https://brainly.com/question/20749341

#SPJ4

which one of the following pieces of information would generally not be covered by a data breach notification law when it appears in conjunction with a person's name?

Answers

The Student identification number would generally not be covered by a data breach notification law when it appears in conjunction with a person's name.

What is a data breach?

A data breach is known as an incident whereby information or data is stolen or taken from a system without the knowledge or authorization of the system's owner. A data breach can be regarded as a cyberattack and during a data breach confidential, private, sensitive, or protected information is exposed to an unauthorized person.

Here's the complete question:

Kevin is assessing his organization's obligations under stat data breach notification laws. Which piece of information would generally not be covered by a data breach notification law when it appears in conjunction with a person's name?

Learn more about Data breach from:

https://brainly.com/question/14774602?referrer=searchResults

#SPJ4

Cybersecurity applications, used across a broad range of industries and government sectors, represent ________ applications.

Answers

Cybersecurity applications, used across a broad range of industries and government sectors, represent DDoS security applications.

Cybersecurity is a process to protect sensitive data, networks, and application software from cyber-attacks. This attack can be considered as an exploitation of resources, unauthorized access to the system, extortion device attack ransomware attack to encrypt data and extort money.

It is not only important to know what cybersecurity is but also to understand why it can be important. The game has been taken to a higher level by hackers, so organizations and their employees need to know what risks they will face if not handled properly. The risks associated with cyber threats or cyber threats are high over time and security breaches can go unnoticed for months.

You can learn more about Cybersecurity here brainly.com/question/28112512

#SPJ4

assume we have a memory that is 2^16 bytes and a cache configuration that consists of 4 sets, 16 lines per set, and 1024 bytes per line. if our program accesses a local integer variable stored on the stack whose value is at memory location 0x4ac3, what is the decimal value of the tag?

Answers

Using a 16-way set associative mapping byte with a line per set of 16. size of memory = 216.

A byte is a unit of data that is eight binary digits long in the majority of computer systems. Most computers store characters like letters, numbers, and typographic symbols in units called bytes. Each byte has the capacity to store a string of bits that must be combined into a single larger unit for application needs. For a program that displays images, for instance, a stream of bits can represent a visual image. A group of bits that make up a computer program's machine code serves as another illustration.

In some computer systems, a word is made up of four bytes. A computer processor can be built to efficiently handle this unit as it reads and processes each instruction.

To know more about byte click on the link:

https://brainly.com/question/15166519

#SPJ4

Which option provides an easy ability to label documents that can then be used as the basis for a document search?
author
title
tags
comments

Answers

An option which provides an easy ability to label documents that can then be used as the basis for a document search is: B. title.

What is a document?

A document simply refers to a computer resource that is designed and developed to enable end users to easily store data as a single unit on a computer storage device.

Generally speaking, all computer documents can be identified by a title, date modified, size, and type such as the following;

AudioImageVideoSystemText

What is a title?

A title can be defined as a feature that avail an end user the ability to easily label a document, as well as serving as the basis for searching for a document on a computer.

Read more on document here: brainly.com/question/24849072

#SPJ1

Create a subtotal for the following :

Answers

The sub-total or the given Junary Monthly Order report is attached accordingly. As is evident from the same, Ciaz has the lowest order while Swift ranks the highest with 545 orders.

What is an order report?

An order report is a financial record of all purchases and registrations made inside your organization. This includes course, path, plan, and domain purchases, registrations, and credit transactions.

It should be noted that in the case of the Open Orders Report, it is a list of all open orders. This report displays critical order details such as the Purchase order (PO) Number, Order Number, Line Status, Delivery Status, and Scheduled Ship Date (SSD)

Learn more about reports:
https://brainly.com/question/14969693
#SPJ1

x = 100
if x > 0:
x -= 1
print(x)

Answers

Answer:

Explanation:

Program  and Reault:

waze, a gps navigation app, relies on inputs from users to provide information on traffic conditions and uses artificial intelligence to develop algorithms for each user, tailoring the route map for that user at that particular moment. this is an example of

Answers

This is an example focused strategy

The example of a focused strategy is when someone utilizes artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

What is focused strategy

focused strategy is when someone utilizes artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

Focusing on a small, niche area of the market or industry is known as a focus strategy.

As a result, one example of focused approach is when someone uses artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

To learn more about focus strategy refer to:

https://brainly.com/question/24242727

#SPJ4

The example of a focused strategy is when someone utilizes artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

What is focused strategy?

Focused strategy is when someone utilizes artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

Focusing on a small, niche area of the market or industry is known as a focus strategy.

As a result, one example of focused approach is when someone uses artificial intelligence to create algorithms for a goal or when they rely on user input to provide information on traffic conditions.

To learn more about focus strategy refer to:

brainly.com/question/24242727

#SPJ4

what is a lightweight access point used for? answer to route frames between the wireless and wired networks. to connect wired or wireless networks together. to manages all of the access points that are connected to it. to create more efficient data paths for network traffic.

Answers

A Lightweight Access Point Protocol can cut down on the time needed for setting up, maintaining, or troubleshooting a sizable network.

The name of a protocol that may manage several Wi-Fi wireless access points simultaneously is Lightweight Access Point Protocol (LWAPP). This can cut down on the time needed for setting up, maintaining, or troubleshooting a sizable network. Network administrators will also be able to thoroughly examine the network thanks to the system.

This system, which is deployed on a centralized server, collects data from RF devices of various brands and environments. A certain collection of devices can be ordered by the server to apply certain adjustments concurrently.

As a standard protocol to enable interoperability across any brand of access point, Lightweight Access Point Protocol was proposed by Airspace. Cisco Systems purchased Airspace. Its goal was to have the Internet Engineering Task Force (IETF) standardize "lightweight" access points, but it was accepted as a standard. It has been submitted to the IETF as RFC 5412 and is sponsored by Cisco Systems.

To know more about Lightweight Access Point Protocol click here:

https://brainly.com/question/28099522

#SPJ4

Which generation of sata storage devices supports up to 6-gbps data transfer rates and addresses solid-state drives?.

Answers

SATA3 of sata storage devices supports up to 6-gbps data transfer rates and addresses solid-state drives.

What is storage device?

A storage device is a component of computer hardware that stores information/data in order to process the results of any computational task. A computer cannot run or even boot up without a storage device. In other terms, a storage device is hardware that is used for storing, transferring, or extracting data files.

SATA3 is capable of speeds of up to 6 Gbps (600 MBps). It mostly addresses SATA solid-state SSDs (hard disc drives are not capable of sending data at this rate).

To learn more about storage device

https://brainly.com/question/28346495

#SPJ4

you would like to run a kernel on a gpu device with compute capability 6.0. there are a total of 1,000,000 threads needed to launch the kernel. the kernel uses 10 registers per thread and 10kb shared memory per block. the kernel is launched as a cubic grid of cubic blocks. the grid dimension is 10 in x, y and z direction. what is the maximum number of simultaneous blocks that will run on a single sm?

Answers

The transaction with the most confirmations will be added to the blockchain if both transactions are simultaneously fetched from the pool for confirmation, while the other transaction will be dropped.

Due to the aforementioned, any node joining the network will be confronted with numerous blockchain branches, many of which may be the same length, and will not be able to identify the main chain. As a result, the node risk being duped into adopting a malicious chain. The Genesis Block, sometimes referred to as Block 0, is the initial block in a blockchain, and it is where all subsequent blocks are added. Since every block refers the one before it, it serves as the ancestor to which all others can trace their descent.

Learn more about Blockchain here-

https://brainly.com/question/26684744

#SPJ4

Other Questions
the headmistress had been in india, i suppose, fifteen years or so, but she still smiled her helpless inability to cope with indian names. what does this quotation suggest about english people in india during the time period in which this memoir is set? according to the consumer price index (cpi), in a particular year, the price of gasoline rises in the united states by 22 percent; simultaneously, the price of all food items falls by 8 percent. which statement is correct? What organisms are able to do photosynthesis?1. Plants and some bacteria2. Plants and animals3. Animals4. Just plants what is the slope of a line that runs through the points (10,10) and (5,10) Connor deposited $84 into his checking account. If his new balance is $51. what was his balance before the deposit?' What is the historical importance of the Virginia House of Burgesses? It made laws for the entire country.It set up the first colonial government.It was the first legislature in the colonies. It established the first colonial rule of law. Rashon has a dimes and y nickels. He has no less than 12 coins worth at most $0.95combined. Solve this system of inequalities graphically and determine one possiblesolution. Which function in vertex form is equivalent to f(x) = x + x +1? Why should we respect sinior citizen? write the negative sentence for the sentences provided below remember where "no" goesmi clase empieze (begins) a las 12:30 de la tardeella tiene catoce anos tu eres perezoso help me please is when all The sides are right Which has the incorrect name-formula combination? A) Cobalt(II) chlorite - Co(CIO2)2 B) Iron(II) chlorate - FECIO4 C) Manganese(II) perchlorate - Mn(CIO4)2 D) Chromium(III) hypochlorite - Cr(CIO)3 Write the quadratic equation whose roots are 3 and 6, and whose leading coefficient is 2. The ratio of mystery books to fantasy books in the library is 7:9.Fill in the missing values to show the possible number ofmystery and fantasy books.Mystery Books Fantasy Books21Select Answer -63Select Answer -2754Select Answer117 What would happen if the earth's orbit were a square, triangle, rectangle, etc.? Is the sequence described as 3,5,8,12,17...... arithmetic. Explain your answer Geometry lvl 1 stuff but im dum __________ are those organizational values that have become so taken for granted over time that they become the core of the companys culture. The words thermometer, hypothermia, and thermodynamics share a common root word. Based on that root word, what do all three have in common? A. ColdB. HeatC. Weather D. Writing Two electromagnetic waves are traveling through a material. Wave 1 has a maximum electric field strength that is three times the maximum field strength of wave 2. How do the average intensities of the waves compare?.