1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
13

A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also

a keypad by an entry door to turn on or turn off the system. Describe how these components can be wired in a combination circuit to provide the needed security.
Computers and Technology
1 answer:
jeka57 [31]3 years ago
5 0
Well think of it like this lets say this wasn't and security system and it was a video game console and remote.
 Now the console or keypad or the main components the power on or shut off the devices and the remote or sensors are the secondary parts but they are needed to help the console or keypad figure out what they are doing.
You might be interested in
Ncomputing and thin client<br>what it is <br>why is done , how it works and how it's <br> done ​
SVEN [57.7K]

The term NComputing  is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.

The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.

<h3>What is the aim of a thin client?</h3>

In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.

It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.

Learn more about Ncomputing from

brainly.com/question/12629145

4 0
2 years ago
Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journal
tino4ka555 [31]

Answer:

Following are the code to this question:

please find the attached file.

Explanation:

In this code, four class "novels, magazines, technical journals, and textbooks", is defined, in which it holds their respective default constructor and the get and set method to hold the string and integer value, and in the book class the main method is defined, that creates its object and a switch to for search value and print its value.

6 0
3 years ago
Which statement is true with regard to project scheduling?
Lubov Fominskaja [6]
A is true because sometimes scheduling doesn’t work out. It’s all about how you plan your project out.
8 0
2 years ago
Read 2 more answers
How did music in the Renaissance differ from medieval music?
Damm [24]
Medieval music was in the time<span>of the middle ages. Renaissance music is the time for art and culture.
</span>
Medieval music refers to music written during the Middle Ages, around the time of 500AD - 1400. Little written music of this period survives, as making scores of music proved expensive, but most music of this time was monothonic or homorhythmic plainchant. Music from this period was generally modal and the begginings of counterpoint were seen in the form of organum. Renaissance music refers to the period from around 1400-1600, although there is some discrepancy in defining the begining of this period. Counterpoint became much more elaborate and it was over the duration of this period that composers began to leave the old modal music system in favour of tonality. Notable composers of this period <span>are Orlando Gibbons, John Bull, Thomas Tallis and William Byrd. </span>
7 0
3 years ago
Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
DIA [1.3K]

Answer:

<h2><em>F</em><em>o</em><em>r</em><em> </em><em>m</em><em>e</em><em> </em><em>y</em><em>e</em><em>s</em><em> </em><em>i</em><em> </em><em>g</em><em>u</em><em>e</em><em>s</em><em>s</em><em> </em><em>y</em><em>o</em><em>u</em><em> </em><em>c</em><em>a</em><em>n</em><em> </em><em>u</em><em>p</em><em>d</em><em>a</em><em>t</em><em>e</em><em> </em><em>a</em><em>n</em><em> </em><em>a</em><em>p</em><em>p</em><em> </em><em>s</em><em>t</em><em>o</em><em>r</em><em>e</em><em> </em><em>i</em><em>n</em><em> </em><em>a</em><em>n</em><em>y</em><em> </em><em>d</em><em>e</em><em>v</em><em>i</em><em>c</em><em>e</em></h2><h2><em>I</em><em>'</em><em>m</em><em> </em><em>n</em><em>o</em><em>t</em><em> </em><em>s</em><em>u</em><em>r</em><em>e</em></h2>

<h2><em>×_× mello ×_×</em></h2>
4 0
3 years ago
Other questions:
  • Emma opened a new document a Microsoft word and typed her assignment. She is now planning to save the documents for the first ti
    11·1 answer
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • A _____ is a link on a web page that leads to another web page.
    13·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • Rewrite each condition below in valid Java syntax (give a boolean expression): a. x &gt; y &gt; z b. x and y are both less than
    7·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Can you help me with this question please ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!