1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
2 years ago
12

A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowds

ourcing?
A mobile application and collar that uses GPS technology to determine the pet’s location and transmits the location when the owner refreshes the application

A mobile application and collar that uses wireless technology to determine whether the pet is within 100 feet of the owner's phone and transmits a message to the owner when the pet is nearby

A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application

A mobile application that transmits a message to all users any time a lost pet is returned to its owner
Computers and Technology
1 answer:
Slav-nsk [51]2 years ago
6 0

Crowdsourcing  is used by mobile application that allows users to report the location of a pet that appears to be lost.

<h3>What is a mobile application?</h3>

A mobile application is known to be a kind of computer app or program that has been made to handle or run itself on a mobile device e.g. phone,  etc.

Conclusively, the option that best describes a system that uses crowdsourcing is the mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application and thus everyone can help to look for it.

Learn more about mobile application  from

brainly.com/question/9477543

#SPJ1

You might be interested in
Joann wants to save the building block she created for the title of her company.
konstantin123 [22]

Answer:

HTML BUILDING BLOCKS

Explanation:

4 0
3 years ago
Read 2 more answers
Which key retains its uniqueness even after you remove some of the fields?
Natasha_Volkova [10]

Answer:

Primary key retains its uniqueness even after you remove some of the fields.

Explanation:

I am assuming that this question is related to database. Therefore, I am answering it according to database context.

In database, you can have multiple rows and columns. Each column shows a specific attribute while each row plots the data according to the attributes. However, there is the first column of each of main table that has unique set of values. It is called the Primary Key. Some key features of primary key are:

  • It always contains the unique value.
  • Its value cannot be null.
  • A table can have at max one primary key.
  • It can be the combination of multiple columns but it must be unique.

Therefore, the primary key has the ability to retain its uniqueness even after you remove some of the fields.

8 0
4 years ago
What do the points on this website do?
DanielleElmas [232]

Answer:

They allow you to ask more questions and also your rank goes up or down.

Explanation:

5 0
3 years ago
Read 2 more answers
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
DIA [1.3K]

Answer: i’m thinking it’s reviewer

Explanation:

4 0
3 years ago
Read 2 more answers
Network administration is concerned with which tasks?
Yuri [45]

A user hacking or looking up utter nonsense....sorry if it didn't help

3 0
4 years ago
Read 2 more answers
Other questions:
  • When creating a software package, the software must be designed, the code must be written, and then the code must be tested. Thi
    6·1 answer
  • Write a program that reads a number in feet, converts it to meters, and displays the result. One foot is 0.305 meters. INPUT and
    8·1 answer
  • Your boss wants to utilize some sort of cloud storage for his files so that all of his
    10·2 answers
  • Assume that the myname.txt file is currently closed. write the code segment that opens the file without erasing it, write anothe
    13·1 answer
  • A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
    6·1 answer
  • Find the maximum value and minimum value in below mention code. Assign the maximum value to maxMiles, and the minimum value to m
    11·1 answer
  • The software program you need to have to read PDF file, such as the PDF files you download from your My Courses page, is
    9·2 answers
  • Which platform is the best? (X-box, PC, Playstation, Nintendo Switch, Wii)
    10·1 answer
  • 3.2 code practice question 2. Not in a rush.​
    15·1 answer
  • Match each role to the corresponding web development task.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!