1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
6

What would be the desired output of a home security system?

Computers and Technology
1 answer:
lyudmila [28]3 years ago
3 0
A desired output would be activating a secret alarm that would notify the police of a home invasion, or activating a really loud one that might scare the burglars and force them to leave the premises.
You might be interested in
What is a variable?
aleksandr82 [10.1K]
Answer. D: a value that looks loads when the program runs.


Explanation:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running.
5 0
3 years ago
Decribe the components of an Microsoft<br>Windows desktop<br>​
damaskus [11]

Explanation:

the main component of Windows when you start your computer are the desktop, my computer, recycle bin , start button, Taskbar and shortcuts to application after opening an application you will also have a Windows with an active application which will appear in your desktop and taskbar.

3 0
3 years ago
What is the unit of measure that specifies the value of cellspacing?
katrin2010 [14]
Pixel is the answer
8 0
3 years ago
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked an
Strike441 [17]

Answer:

Option C is the correct option.

Explanation:

When any email or message is received from the FBI in the user's computer system and the following message is about the user's computer system has been locked and they demand some amount to unlock their data or information.

So, the following scenario is about the ransomware because they ransom money to retrieve their data and information from the system.

5 0
3 years ago
Most internet connections use what transmission
Orlov [11]
Most internet connections use full-duplex transmissions. (Please give brainliest answer :) :D )
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is going to be the shortest, most concise restatement of information?
    10·2 answers
  • What do you call a named collection of data stored on a disk?
    15·1 answer
  • Which of the following is not a good technique for photographing groups? Visiting the location.
    9·1 answer
  • San Diego broker Cal Abrams has avoided the technological trend of the past 20 years. Finally, he's jumped online and realized w
    14·1 answer
  • Select the correct statement(s) regarding partial mesh networks.
    5·1 answer
  • Create a recursive method, a method that calls itself, that returns the number of vowels that appear in any string given. Keep i
    11·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • 11111 Power 2 sovle ​
    14·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • This is your code.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!