1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
6

"When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have"

Computers and Technology
1 answer:
fomenos3 years ago
3 0

Answer:

Alexa or Siri

Explanation:

They are a voice inside your phone or tech and they can control everyday work

You might be interested in
The protection of intellectual property (ip) is an example of what kind of information security need?
timama [110]

The protection of intellectual property (IP) is an example of Confidentiality of information security need, Unauthorized disclosure of intellectual property might result in the loss of whatever competitive advantage the IP may have provided the company.

What is considered IP?

Any creation of human intelligence that is shielded by the law from illegal use by others is generally referred to as intellectual property. A limited monopoly over protected property is inevitably created by the ownership of intellectual property.

Who owns intellectual property?

A work's owner is typically considered to be its creator. But for various kinds of property and in various situations, intellectual property ownership can be decided in various ways. For instance, if a piece of work is produced for a client, the client is the owner of that intellectual property.

Learn more about intellectual property: brainly.com/question/18650136

#SPJ4

3 0
2 years ago
Quick!!!!!
Vlad [161]

Answer:

B. the current affairs page

Explanation:

it's a simple question

8 0
4 years ago
Read 2 more answers
A person attempts to access a server during a zone transfer to get access to a zone file. What type of server is that person try
DerKrebs [107]

Answer: DNS Server

Explanation:

DNS server is the server that has the database along with the IP addresses along with names of the host as well in a computer system. So, by accessing the zone file , the person is actually trying to manipulate the host that is present in the DNS server zone. DNS server helps in the execution of the particular software and maintaining the connection using some protocols.

4 0
4 years ago
Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA' as two inputs and returns two independent set
wolverine [178]

Answer:

Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't take the symbol

If you are executing this script with any other script, Add "GO" to the line above "CREATE PROCEDURE", on a line all by itself, and it should fix that error of 'CREATE/ALTER PROCEDURE'

Explanation:

CREATE PROCEDURE sp_Q1

"at"country1 NVARCHAR(15),

"at"country2 NVARCHAR(15)

AS

BEGIN

  BEGIN

      SELECT SupplierID, CompanyName, Phone, Country FROM suppliers

      where Country in ("at"country1,"at"country2)

     

  SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Products

      where SupplierID in(

      SELECT SupplierID FROM suppliers

      where Country in ("at"country1,"at"country2)) ORDER BY SupplierID

  END

END

GO

-- Testing script.

DECLARE "at"RC int

DECLARE "at"country1 nvarchar(15)

DECLARE "at"country2 nvarchar(15)

-- Set parameter values here.

set "at"country1='UK'

set "at"country2='Canada'

EXECUTE "at"RC = [dbo].[sp_Q1]

"at"country1

,"at"country2

GO

5 0
4 years ago
Help me please big test
4vir4ik [10]

Answer:

keyboard I think. sorry if I'm wrong

5 0
3 years ago
Other questions:
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • A system of interlinked documents that are available on the internet is
    5·1 answer
  • Which is the correct process for selecting an entire row in a spreadsheet?
    15·2 answers
  • QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
    14·1 answer
  • Which gauge indicates the total number of miles your car has been driven since it was manufactured? A. The speedometer B. The ta
    13·2 answers
  • Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space.
    7·1 answer
  • Write a Java program to accept an item's name and price from the user and output them to the console
    5·1 answer
  • What is the generic term for a mode or method of malware infection?
    8·1 answer
  • What are the document involved in E payment​
    15·1 answer
  • What is a leased line​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!