1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
10

Que son los sistemas de control con retroalimentacion

Computers and Technology
1 answer:
iren2701 [21]3 years ago
5 0
Existen 2 clases comunes:
sistema de lazo abierto: la salida no efecto sobre el sistema
sistema de lazo cerrado: la toma de desiciones del sistema de la entrada si no también de la salida
You might be interested in
The benefits associated with software reuse are lower cost, better quality,
Sholpan [36]

Answer:

Software reuse is the technique through which updating the software system through the already defined components or assets of the software.This helps in increasing the productivity ,cost decrement , quality improvement etc.

But in actual case, the software reuse still persist high cost due to modification of inflexible designing of software .It also costs more than expected for the maintenance and training of software.

The security of the software is always at risk because of the usual and advanced hacking and attacking by the hackers even when the protect of software is high.Thus, these statements verify that the benefits of cost and security of software is not actually realized.

6 0
3 years ago
LOLer was chatting online with l33ter. "I can't believe how lame some people are! :) I can get into any system by checking out t
Mkey [24]

Answer:

The answers are <em>"</em><em>hacker </em><em>and </em><em>hacking</em><em>"</em>

Explanation:

LOLer is an security hacker who uses computer bugs and other exploits to break into a company or personal network system by using their personal ingenuity and other accesses. Thus the process he described of getting into the company server details and getting peoples IP addresses and details on the company involves security hacking of the company network.

5 0
3 years ago
The __________ format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive
Soloha48 [4]

The EnCase format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive images and individual files. The Encase file format keeps backup of various types of digital evidences. It includes disk imaging, storing of logical files, etc. The procedure is referred to as Disk Imaging.

4 0
3 years ago
Which of the following are devices that work essentially like a pen and paper, allowing the user to input drawings on a computer
DochEvi [55]
The device that work essentially like a pen and paper, allowing the user to input drawings on a computer is graphic tablet. The first option is correct.
3 0
3 years ago
Write a program that first gets a list of six integers from input. The first five values are the integer list. The last value is
Andrew [12]

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

    int[] arr = new int[5];

   

    System.out.println("Enter values for integer list: ");

    for (int i=0; i<5; i++){

        arr[i] = input.nextInt();

    }

   

    System.out.print("Enter the threshold: ");

    int t = input.nextInt();

   

    outputIntsLessThanOrEqualToThreshold(arr, t);

   

}

public static void outputIntsLessThanOrEqualToThreshold(int[] arr, int threshold){

   

    for (int x: arr){

        if (x<threshold)

            System.out.print(x + " ");

    }

}

}

Explanation:

Create a function called outputIntsLessThanOrEqualToThreshold that takes two parameters, arr and threshold

Check each element in the arr. If they are smaller than the threshold, print the element

Inside the main:

Initialize the array with user inputs and get the threshold value

Call the outputIntsLessThanOrEqualToThreshold function with the entered array numbers and threshold value

6 0
2 years ago
Other questions:
  • What is the most important concept in security and architecture design?
    9·1 answer
  • You can access decorative underlines and change their color through the ____ drop-down.
    8·1 answer
  • What does prominent hyperintensity mean relating to MRI?
    5·1 answer
  • How do you optimize a website using JavaScript?
    10·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • Identify the equation that translates Y = In(x) five units down.​
    8·1 answer
  • 11. First featured in Donkey Kong, the jump button let to the creation of a new game category known as __________
    9·1 answer
  • Complete the following sentence by choosing the best answer from the options listed below.
    11·2 answers
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!