1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
9

A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could

use at least one type of input and one type of output to create a physical computing device to help this friend.
Computers and Technology
1 answer:
omeli [17]3 years ago
4 0

Answer:

water temperature gauge sensor

Explanation:

  • We can connect a temperature sensor connected to the water and a heater or cooler sensor, we have created a program to check the temperature from the sensor.
  • when the water is hotter than recommended, we turn on the refrigerator and when it is cold, we turn on the heater
  • so correct answer is water temperature gauge sensor

You might be interested in
What is computer ????
LekaFEV [45]

Answer:

Explanation:

A computer is a device that manipulates information, or data accrding to the instructions given to it and give us an output. It has the ability to store, retrieve, and process data.

6 0
4 years ago
Ssl/tls provides security ________. a. between the sender and his or her e-mail server b. all the way between the sender and the
Brrunno [24]
SSL <span>stands for Secure Sockets Layer and TLS stands for </span>its<span> successor Transport Layer </span>Security. They are protocols responsible for encryption and authentication and are  application-layer protocols. SSL/TLS provides security all the way between the sender and the receiver, which means also between the sender and his or her e-mail server . Correct answer: c. both a and b.
7 0
3 years ago
One of the files you should now have in your fileAsst directory is TweedleDee/hatter.txt. Suppose that you wished to copy that f
Paha777 [63]

Answer:

cp /path/to/source.txt .

is the general format of copying a file to the current directory

cp ~/UnixCourse/fileAsst/TweedleDee/hatter.txt .

You can refer to the current directory with a dot (.)

Explanation:

First, we would like to delete all files in our current directory (commandsAsst directory). To delete the files inside the directory, we would run the following command:

rm -r commandsAsst/*

This command delete the files recursively. Usually, the command for deleting is rm -r. The operator * run rm -r on every file or directory within commandsAsst.

5 0
3 years ago
What is one effective way for employees to keep their skill-sets current
natta225 [31]
Is it a multiple choice answer? if so would like to see the answers as there are TONS of effective ways and if i list one it may not be in that list you have if its multiple choice.
3 0
3 years ago
True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
Anna11 [10]

Answer:

TRUE

Explanation:

In telecommunication and computing, there are different units of data storage. The most commonly used units are the bit and the byte.

A bit is the capacity of the system having only two states.

Whereas, the byte, also known as octet, is equal to eight bits. The unit symbol for Byte is B. In many computers, it is the smallest addressable unit of memory.

Therefore, <u>the given statement is TRUE</u>.

6 0
4 years ago
Other questions:
  • What are preconceptions?
    9·2 answers
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • Public class Car {
    15·1 answer
  • Write an application to pre-sell a limited number of theatre tickets. Each buyer can buy as many as 6 tickets. No more than 178
    5·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
  • the handles the overall activity of the computer and provides services such as memory management, input/output activities, and s
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!