1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
13

Which of the following inputs help robotic vacuum cleaners maneuver around obstacles?

Computers and Technology
2 answers:
Alja [10]3 years ago
7 0

Answer:

c lasers and sensors

Explanation:

NARA [144]3 years ago
4 0

i think Lasers and sensors or keypads and intuition it is ur chose bro. But i recommend laser and sensors it is better because it can stop if something is in the way.

You might be interested in
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
Vlad [161]

Answer:

Install in Safe Mode

Explanation:

If a system is corrupted with malware, installing an antivirus or anti-malware might not be possible. The malware can hide in a system and it can prevent the anti malware software from installing or scanning on the system.

Running your system in safe mode and install is the best option. Safe mode blocks third party programs and hardware drivers. A malware should not start when a system is in safe mode, therefore you can install the anti-malware and scan to remove all the malware from your system.

5 0
3 years ago
Which Tab provides the command to add a hyperlink to a document?
Natali [406]

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

7 0
3 years ago
Read 2 more answers
7.4.1C The global distribution of computing resources raises issues of equity, access, and power. Briefly describe one of these
nika2105 [10]

It has been accentuated. An organization is a system consisting of: people, material resources and information, being the last, the nerve center of the previous two that allows the survival of these. This statement refers to the most recent conceptions defended by the Information Management (IM), in the sense that organizations should be considered primarily as information systems.

Lynda Woodman's definition of IM states that "management is everything that refers to obtaining the right information, for the right person, at the right price, at the right time and place, to make the right decision."

As for the MIR, part of the assumption of recognition that information is a resource, a value that should be managed like any other, because among the similar characteristics we have:

* acquired at a cost and chargeable in money

* has specific and measurable characteristics

* control of the cost of information,

* has a life cycle,

* ability to be processed and refined, etc.

For Elizabeth Adams "the MIR is a function of top management, to develop a series of policies, programs and procedures to effectively and effectively plan, manage and control the information needs and support resources of information management." In this directive task, the components that participate and the areas in which the person responsible for it must operate are:

1.- information resources: that is, identification, evaluation and use of these, not only internal but also external.

2.- Appropriate technology: to collect, store, retrieve or disseminate information.

3.-management: general planning, human resources, communication, accounting and marketing.

In today's world, there is a tendency to grant special treatment to everything that is related to information; and it is this situation that gives rise to the importance of the management / management of information resources (MIR).

This era of information, characterized as significant changes, flexibility, uncertainty and the "great battles" (for competitiveness, leadership, competition, reduction of uncertainty and risk, etc.), it is necessary to keep updated as soon as to the significant changes that occur in the technology of products and processes, as well as in their management and competitiveness patterns.

We live in an era where the common denominator of progress will be the wise application of information, science and technology, in the production of goods and services for the satisfaction of social needs, as well as the adequate use of resources to increase the wellbeing of society and man. In others, words, we are talking about the correct management of information.

Information management is the new name of the development. Are the professionals (librarians, documentalists) ready to accept the challenge? We believe that information professionals are in an adequate situation, have knowledge, resources, capacity and conditions to maintain a sustainable leadership in the organization of information, but they have to determine what they believe their position should be and fight for it. We must start from the basic criteria, restructure the concept of the information scientist to adapt it to the new, complex and changing needs of the organization and the community.

6 0
3 years ago
Which activity is performed during high-level design in the V-model?
SVETLANKA909090 [29]

Answer:

understanding component interaction

4 0
3 years ago
Why would a virtual machine be useful in a school? It provides a completely secure connection to the internet. Students can coll
Stels [109]
They can learn more and also it’s faster
5 0
3 years ago
Other questions:
  • In a Python dictionary, an association is formed between what two components of the dictionary?
    15·1 answer
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • How can my computer catch a virus?
    13·1 answer
  • 7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain whe
    5·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • Importance of spread sheets​
    8·2 answers
  • What steps should you take if your harassed online​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!