1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
6

In​ today's global​ environment, everything and everyone are digitally connected to everything and everyone else. The term used

to describe this is​
Computers and Technology
1 answer:
Rudiy273 years ago
8 0

Answer: IoT(Internet of things)

Explanation: Internet of things(IoT) is the system that consist of the human beings, animals ,computing devices, operating systems and other elements together. In this system these elements are have the unique identifiers for the being separate entity for transferring of the data.

The data transfer in this kind of environment is dependent upon the individuality and not requiring the human to human or human to computer network .

You might be interested in
Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop
Mila [183]

Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, proposals, and notes.

There is no denying the fact that digital communication has a lot more advantages as compared to the traditional methods of business communication, but there are certain cases and situations where traditional methods and preferred over digital communication.

Paper-based messages provide objective evidence that a formal undertaking has been issued. The advantage of paper-based messages is that they can't be tampered with and not reproduced. They represent the signature of the concerned authority and are always treated above the digital signatures.

5 0
3 years ago
A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
Elena L [17]

Answer:

// here is code in java.

import java.util.*;

class Solution

{

// main method of class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // declare variable

         double caffeine;

    // scanner object to read input from user

       Scanner scr=new Scanner(System.in);

       System.out.print("Enter the initial amount of caffeine:");

        // read the initial amount of caffeine

           caffeine=scr.nextDouble();

          // calculate amount of caffeine after 6,12,18 hours

          for(int i=1;i<=3;i++)

          {

               System.out.println("After "+ i*6+" hours:"+(caffeine/2)+" mg");

               // update the caffeine after every 6 hours

               caffeine=caffeine/2;

          }

                 

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create a variable "caffeine" to store the initial amount of caffeine given by user. Run a loop for three time, it will calculate the amount of caffeine left after every 6 hours.First it will give the amount of caffeine left after 6 hours, then caffeine left after 12 hours and in last caffeine after 18 hours.

Output:

Enter the initial amount of caffeine:100

After6 hours:50.0 mg

After12 hours:25.0 mg

After18 hours:12.5 mg

8 0
3 years ago
(Correct Answer Recieves Brainliest)
astraxan [27]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
How do you reflect yourself in the topic (filters)​
Gnesinka [82]
In what topic ?? Please explain more
6 0
3 years ago
If you want to conserve ink or toner, you can instruct PowerPoint to print ____ documents.
kondor19780726 [428]
I believe the answer would be Draft Quality. (300x300 resolution).

5 0
3 years ago
Other questions:
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • What is the output of the following program when the method is called with 4?
    11·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • Develop a C++ program that will determine whether a department store customer has exceeded the credit limit on a charge account.
    13·1 answer
  • Which of the following is a valid c++ identifier a. mouse b. _int c. 2_stop d. float​
    10·1 answer
  • Will give brainliest
    8·1 answer
  • Please help this is a coding assignment I need help! (use python)
    12·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
  • Write a pseudocode for the logic of a program that accepts five numbers from a user and displays one of the following messages:-
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!