1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
9

Help with this chart please

Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
8 0

Well GPS works by sending a signal into space that gets a satellite to pin you on earth. So if you trying to turn off the ringer wile in school you would have to make a app that gets the satellite to pin you on the map then say if your in school or in like a 5 mile radius of your school to tell the app to turn off your ringer on your phone.


Your app would need;



Your Schools location, Your location, Your ringer state(On/Off), And it would need if you have school they day(Like on the weekend).

Then you just have to put it together

You might be interested in
wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be
vichka [17]

Answer:yo bro I don’t know but the answer is b

Explanation:

8 0
3 years ago
Read 2 more answers
[ANSWER = BRAINLIEST] How to mark an answer as brainliest?
Hoochie [10]

Answer:

once your question is answered you get an option available on the bottom of the answer

<em>see attached</em>

and you click on<u> Mark as brainliest </u>

8 0
4 years ago
Read 2 more answers
What does this say in morse code?
Furkat [3]

Answer:

That it is time for lunch?

Explanation:

4 0
3 years ago
Read 2 more answers
A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
Alexxx [7]

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

7 0
3 years ago
Consider an online shopping portal that allows a customer to browse and purchase different products. The products are arranged u
o-na [289]
Way too much to read bye
7 0
3 years ago
Read 2 more answers
Other questions:
  • Where should Nolan go to change the font size of his message before printing it? A.the Paper tab in the Define Styles dialog box
    14·1 answer
  • Which motherboard slot has direct access to the north bridge?
    7·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
    7·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • On what basis can you categorize the generations of computers?
    5·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • Did anyone else remember that Unus Annus is gone? I started crying when I remembered.... Momento Mori my friends.... Momento Mor
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!