1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
1 year ago
7

Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui

d flow over airplane wings?
Computers and Technology
1 answer:
Katyanochek1 [597]1 year ago
3 0

My response is No, the programs that understand physics and/or hardware are not embedded.

<h3>Why is my response No?</h3>

This is due to the fact that , these programs are known to  never be taken or considered to be embedded because they are not  part of the integral aspect or component of a large system.

An embedded system is seen as a mix-up of computer hardware and also those of software designed and this is one that is known to be made for a specific function.

Therefore, based on the above, My response is No, the programs that understand physics and/or hardware are not embedded.

Learn more about embedded program from

brainly.com/question/13014225

#SPJ1

You might be interested in
Suppose that the first goal in a GP problem is to make 3 X1 + 4 X2 approximately equal to 36. Using the deviational variables d1
Scrat [10]

Answer:

d. d1− = 10, d1+ = 0

Explanation:

Given

3X1 + 4X2 +d1− − d1+ = 36

X1 = 6

X2 = 2

Required

Possible values of d1- and d1+

We have:

3X1 + 4X2 +d1− − d1+ = 36

Substitute values for X1 and X2

3 *6 + 4 * 2 + d1- - d1+ = 36

18 + 8 + d1- - d1+ = 36

Collect like terms

d1- - d1+ = 36 - 18 - 8

d1- - d1+ = 10

For the above equation to be true, the following inequality must be true

d1- > d1+

Hence,

(d) is correct

Because:

10 > 0

3 0
2 years ago
Which of the following are incorrect safety precautions for equipment operators? A. Drive equipment or vehicles on grades or roa
Zarrin [17]
Hello!

The correct answer would be: D. Should not exceed a vehicle's rated load or life capacity.

I hope you found this helpful! :)
3 0
3 years ago
Read 2 more answers
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What
Vadim26 [7]

Answer:

NOT mobile app. NOT Cloud-based app.

Explanation:

4 0
3 years ago
In windows, a(n) ________ follows the file name and a period and indicates the file type.
larisa [96]
Ans : Extention

In windows, a(n) extension follows the file name and a period and indicates the file type.
4 0
3 years ago
Identify two entities and 2 of their attributes from the given scenario.
polet [3.4K]

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
8 0
3 years ago
Other questions:
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • OSHA requires that employers pay for most required personal protective equipment (PPE), including: A. Hard hats B. Logging boots
    5·1 answer
  • DJ wants to see how his document will look when printed. Where would he find the button to see the document in print view? the P
    5·2 answers
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be
    15·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • Which attack intercepts communications between a web browser and the underlying computer?
    10·1 answer
  • Write a program that accepts any number of scores ranging from 0 to 10
    14·1 answer
  • The Synonyms submenu offers a list of synonyms for a word. Is it always a good idea to use whatever synonyms are presented on th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!