1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
4 years ago
8

Name the two types of control systems. PLEASE HELP THIS WAS DUE HOURS AGOOOO

Computers and Technology
2 answers:
vodomira [7]4 years ago
5 0

Answer:

Open loop control systems.

Closed loop control systems.

Explanation:

Assoli18 [71]4 years ago
4 0

Answer:

here u go

GOOD LUCK!!!

Explanation:

belief systems, boundary systems, diagnostic systems and interactive systems.

You might be interested in
Suppose a 4096 bit message is sent along a 10Mbit/sec transmission link. Suppose that the latency between the sender and the rec
umka21 [38]

Answer: 8.1 msec.

Explanation:

If we are told that we have a transmission link of sending 10 Mbits in one second, setting up a direct proportion, we can find out how much time is needed to send 4096 bits along the same channel, as follows:

10⁶ bits = 1 sec

4096 bits = x  ⇒ x = 4096 bits. 1 sec / 10⁶ bits = 4.1 msec.

As we have 4 msec of latency between sender and the receiver, we need to add these 4 msec to the transit time, so we have a total message transmission time of 8.1 msec.

8 0
3 years ago
What term describes what an actor breaks when he addresses the audience directly from stage,like in Hamlet's "to be or not to be
Lera25 [3.4K]
It's the term, 'breaking the fourth wall.'

7 0
4 years ago
1. What type of programmer uses HTML application?
jok3333 [9.3K]

Answer:

Front end developers and Full Stack developers

Explanation:

Although most programmers know HTML (HyperText Markup Language), front-end developers who work on making the user's visual experience with an application the best have to be proficient in HTML. It is used to define the structure of web content on a website for example.

Full Stack developers have a strong grasp of the tools and suites a front-end and back-end developer might use to develop complete software

3 0
3 years ago
A security analyst discovered data such as images and word documents hidden within different types of files. Which of the follow
Llana [10]

Answer:

(c) Steganography

Explanation:

Steganography is an encryption method that describes the hiding of data within another data. The hidden data and the data that is hiding it can be of any types - audio, images, video or text files. Steganography allows sensitive data or information to be protected or hidden (not easily detected).

Steganography uses two data objects - the message and the carrier. The message is the sensitive information to be hidden while the carrier is the data that is hiding the message.

An example of steganography is in a situation whereby watermark is added to an online text document in order to prevent it from being downloaded by unauthorized users. In this case, a text is hidden in another text.

4 0
3 years ago
Which statements describe the elements of the email function? Check all that apply.
liq [111]

Which statements describe the elements of the email function? Check all that apply.

Messages are delivered from one email address to another.

An email address can be used to identify the sender in Contacts.

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Answer:

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Explanation:

Elements of email function include the local part of the email which can contain the username, the domain part of the email, the sender, receiver, and other components.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
    11·2 answers
  • How to track flash socket server connections wireshark?
    10·1 answer
  • class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
    15·1 answer
  • Write a program that prompts the user for an integer, then asks the user to enter that many values. Store these values in an arr
    14·1 answer
  • How can you change your mindset ? What are some fears you have had to overcome related to school ?
    10·1 answer
  • The Office ____ is a temporary storage area. Warehouse Clipboard Storehouse Gallery
    15·1 answer
  • Which Python expression results in 49?<br><br> 7 * 2<br><br> 7^2<br><br> 7 // 2<br><br> 7 ** 2
    12·2 answers
  • ____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.
    5·1 answer
  • Which cpu type would most likely be found in a smartphone?.
    10·1 answer
  • Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!