1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
2 years ago
6

Most browsers allow you to maintain your most frequently visited websites. what is this called? Special place holder, secret lis

t, bookmark, or personal place saver
Computers and Technology
2 answers:
Pie2 years ago
7 0
Bookmark is the correct answer
Fed [463]2 years ago
4 0
The answer is bookmark
You might be interested in
If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
sladkih [1.3K]
Have them post more positive outcomes and help them understand that what they post stays there forever
4 0
2 years ago
Read 2 more answers
The first project that this position will work on is an embedded sensor that will send readings periodically to the cloud, and h
Mice21 [21]

Answer:

we need PLC(Programmable Logic Units) attached to the sensors  and those sensors will take the signals/values  and transfer them to the cloud .In cloud we store that information and send that information to the web application where user is able to view

Explanation:

it looks like a SCADA system. we can integrate PLC with SCADA

or

for developing PLC we can use c or c++.it contain logic to transfer data to cloud

for cloud storage we can use Microsoft azure which is useful for data storage in sql servers

for web application we can use ASP.Net to interact with cloud and get data from there and display the results to the user on UI

6 0
3 years ago
Write an if/else statement that compares the value of the variables soldYesterday and soldToday, and based upon that comparison
jenyasd209 [6]

Answer:

if(soldYesterday > soldToday){

salesTrend = -1;

} else if(soldToday > soldYesterday){

salesTrend = 1;

}

Explanation:

The if/else statement is more explicit. The first if condition check if soldYesterday is greater than soldToday, if true, then -1 is assigned to salesTrend.

Else if soldToday is greater than soldYesterday, if true, then 1 is assigned to salesTrend.

7 0
3 years ago
Binary numbers are based on __________.
Lena [83]
D. Two digits (1s and 0s
8 0
3 years ago
Read 2 more answers
What kind of eolr would you need to not have a open trouble on the facp
zhannawk [14.2K]

Answer:

here are three basic categories for fire alarm panel signals: trouble, supervisory, and alarm. Trouble Signal. A trouble signal is typically designated by a yellow light and means that there is an operational issue. For some more advanced systems, the panel may indicate the kind of problem and where it is located.

Explanation:

8 0
3 years ago
Other questions:
  • Hit and Slopes Program: A Write a program that can be used by a ski resort to keep track if local snow conditions for one week.
    15·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Which method deletes a footer from a document?
    13·2 answers
  • . If you have written the following source code:
    9·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
    14·1 answer
  • Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the s
    9·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!