1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
4 years ago
9

How is abstraction used in a GPS system

Computers and Technology
2 answers:
ipn [44]4 years ago
8 0
The designs on the map of the GPS system Im would think but can you be more specific?
Alex777 [14]4 years ago
8 0

Answer:

Abstraction is used in GPS system to provide better interfaces while adding the extra functionalities that are complex to manage.

Further Explanation:

Global Positioning System (GPS): GPS is a satellite positioning system that uses satellites to provide location, time synchronization and velocity for air, land and sea.

The five main uses of GPS are:

  • Location: Finding a position
  • Navigation: When travelling from one position to other
  • Mapping: For creating maps of different locations of universe
  • Tracking: For monitoring the movement
  • Timing: To find the time measurement

The applications of GPS are include:

  • Entertainment
  • Health and Fitness
  • Construction
  • Transportation
  • Emergency Response

In GPS, abstraction is used to reduce the design complexity of the computer system.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: Middle School

Subject: Computers and Technology

Chapter: GPS System

Keywords:

GPS system, abstraction, used, computer system, entertainment, health and system, construction, transportation, emergency response, satellite position system, air, land, sea, location, navigation, time synchronization

You might be interested in
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school
vazorg [7]

Answer:

then she should buy the one that can last long cause if she buy the one that is bad that could also be assets the risks to buying an extended warrantly for her new laptop for school

4 0
3 years ago
Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
Tema [17]

Answer:

Code is provided in the attachment form

Explanation:

Vector Multiplication code:

Vector_multiplication.c file contains C code.

See attachment no 1 attached below

Classification of Algorithm: For creating elements in vector c of size n, number of scalar  multiplications is equal to n. The size of original two vectors scales directly with the number of  operations. Hence, it is classified as O(n).

7 0
3 years ago
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
dolphi86 [110]

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

4 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • A __________ network is good for connecting computer clusters.
    13·2 answers
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Why is important to maintain a naming convention within the company that is developing computer programs?
    6·1 answer
  • A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and prin
    9·1 answer
  • Sukhi needs to insert a container into her form to collect a particular type of information. Which object should she insert?
    6·1 answer
  • Why when I move stuff in Roblox Studio like an object or a Character. It tilts the opposite direction I'm moving it to with the
    6·2 answers
  • If a menu-driven program uses a loop to redisplay the menu after a selected operation has been performed, the menu should probab
    14·1 answer
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • What is the BCC feature used for?
    12·2 answers
  • Research the significance of the UNIX core of macOS and write a few sentences describing your findings.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!