1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
10

What are the two protocols used most often with iot devices? (select two. )

Computers and Technology
1 answer:
makkiz [27]2 years ago
4 0

Z-Wave and Zigbee are the two protocols that are used most often with IOT devices.

<h3>What is a protocol?</h3>

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as Z-Wave and Zigbee.

In Computer networking, the two protocols that are used most often with Internet of Things (IOT) devices include the following:

  • Z-Wave
  • Zigbee

Read more on protocols here: brainly.com/question/17387945

#SPJ12

You might be interested in
ASAP!!!!!!!
Sidana [21]
A .2:)())...........\\
5 0
3 years ago
Read 2 more answers
What type of strategy is being used by a website like www.CNNMoney when it describes itself as ""a one-stop destination covering
alina1380 [7]

Answer:

Positioning

Explanation:

One of the most important concept of marketing is Positioning. It is a marketing concepts that provides a description of what businesses must do to ensure its products are marketed and its services rendered to customers. When positioning your organization, the image of the organization's product is created with its intended audience in mind, by using promotion, place, product, and price.

4 0
3 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the bro
Vlad1618 [11]

Answer:

Following are the code to this question:

var id= document.createElement('script');//defining id varaible that uses the createElement method  

ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link

alert("The loaded Script is: ");//defining alert box that print Script loaded.

Explanation:

In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.

8 0
4 years ago
. Here is a sequence of addresses during execution of some program: 4, 16, 0, 20, 52, 68, 172, 64 Assuming a fully associative c
k0ka [10]

Answer:

See explaination for the illustrations on the question.

Explanation:

A program cache miss usually occurs at the instance of an instruction fetch failing to read an instruction from the program cache and the processor is required to access the instruction from the next level of memory. A request to L2 or external memory has a much higher latency than an access from the first level instruction cache.

A cache on its own can be defined as is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory.

Please kindly check attachment for the step by step diagramming illustrations of the questions.

6 0
4 years ago
Other questions:
  • How auto insurance companies manage risk?
    12·1 answer
  • Which header provides functions that deal with exceptional conditions?
    13·1 answer
  • How long would it take a 8 bit computer to calculate π to the thousandth place?
    8·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • Typically, a DVD has how many times more capacity than a CD?
    12·1 answer
  • 50 POINTS
    6·1 answer
  • Technology, by itself is neither good nor bad.<br> A) true<br> B) false
    11·2 answers
  • What are the four major software packages of microsoft​
    11·1 answer
  • Which is a guideline for conducting technical reviews?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!