1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
14

Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove

r short distancesb. via radio signals Correctc. using cloud servicesd. via databases
Computers and Technology
1 answer:
just olya [345]4 years ago
5 0

Answer:b)via radio signals

Explanation: Machine-to-machine technology is the technology that helps in sharing of the real time information of the device that have embedded sensor.They can work without the help of the manual factors.

The data is shared through the help of the radio signals in the devices like turbines vending machines etc for the tracking purpose and managing.

Thus the other options are incorrect because short distance is a disttance, cloud services are for the collection of services and databases contains the data. So, the correct option is option (b).

You might be interested in
1. A(n)
Dennis_Churaev [7]

Answer:

1.Spelling checker


2. Order of mathematical operations .

3. Series  

4. Pick from list  

5. Sum Function


6. Active Cell  

7. cell


8. Accounting format


9. Format

Explanation:

4 0
3 years ago
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
Which country is Europe's largest Internet market, with Internet users growing at a rate of 10 percent annually?
pashok25 [27]

Answer:

Germany

Explanation:

6 0
3 years ago
Recall that in C++ there is no check on an array index out of bounds. However, during program execution, an array index out of b
aev [14]

Answer:

b b hhhhh sssss this i scool i just want the points and not to help people i just im using this

Explanation:

im joking idk the answer im so sorry to bother you

4 0
3 years ago
I'm doing C++. When i multiply 200000 by 200000, i get 1345294336. I wrote
egoroff_w [7]
Even though your variable x is large enough to hold the answer 40000000000, the constants 200000 are treated as integers, such that the multiplication is first fitted in an integer that is too small.

The solution is to use the 'LL' suffix on the constants, so that the compiler knows to treat them as long longs from the start:

long long x = 200000LL * 200000LL;

The number <span>1345294336 can be explained by ANDing 40000000000 with 0xFFFFFFFF (which is the maximum size of an unsigned long)</span>
4 0
4 years ago
Other questions:
  • The inherent portability of which medium, gives it an advantage over other types of media that require an individual’s full atte
    10·1 answer
  • Question 5
    5·1 answer
  • What are two ways to access the options for scaling and page orientation? click the home tab, then click alignment, or click the
    10·1 answer
  • The dfs replication engine uses a form of replication called
    6·1 answer
  • Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the n
    7·1 answer
  • When should else be used in programming?
    15·2 answers
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • help i was building my pc and i pushed the cpu into the socket really hard until there was an audible crack and it went into the
    7·1 answer
  • Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
    6·1 answer
  • To remove a specified number of characters from anywhere within a string, you should use the ____ method.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!