1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
3 years ago
15

_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless

networks.
Computers and Technology
1 answer:
gladu [14]3 years ago
8 0
The answer is Internet of Things (IoT)
You might be interested in
The user can close all the programs if he closes the open virtual desktop true false
steposvetlana [31]

The user cannot close all the programs if he closes the open virtual desktop.

<h3>What are virtual desktops?</h3>

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: brainly.com/question/14332029

#SPJ12

3 0
2 years ago
Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
shutvik [7]

Answer:No service from hospital for injured people

Explanation:

Yes of course

4 0
3 years ago
What is one way for an entrepreneur to decrease risk?
marysya [2.9K]

Answer

we can  decrease risk for an entrepreneur by creating a team of trusted advisors to rely on.

there are some points that we can take in mind know how  to position our company as a safe position.

revenue streams and additional technology, paving the way for future growth.

Entrepreneurs can use all these  unique strategies to decrease those risk

8 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Mm
Luba_88 [7]

Answer:

Print Area

Explanation:

First, I'll assume Donte is making use of a spreadsheet application (Microsoft Office Excel, to be precise).

From the given options, only "Print Area" fits the given description in the question.

The print area feature of the Excel software allows users to print all or selected workbook.

To print a selection section, Donte needs to follow the steps below.

Go to File -> Print.

At this stage, Donte will have the option to set the print features he needs.

Under settings, he needs to select "Print Selection"; this will enable him Print sections of the entire workbook.

Refer to attachment for further explanation

8 0
3 years ago
Other questions:
  • Design the below using an array// Sunrise Freight charges standard// per-pound shipping prices to the five states they serve// –
    6·1 answer
  • Write a program that defines an interface having the following methods: addition, subtraction, multiplication, and division. Cre
    8·1 answer
  • Technician A says underinflation of a tire causes excessive one-sided wear on one side of the tread. Technician B says overinfla
    11·2 answers
  • What is the purpose of copyfitting?
    12·1 answer
  • What does the cpu do (in terms of register contents and stack) when it executes a jsr instruction?
    12·1 answer
  • In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an internally identifi
    6·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Write the correct word to complete the sentence:
    7·1 answer
  • How is blockchain different from traditional database models?
    12·1 answer
  • assume a class named window has an accessor method named getwidth that accepts no parameters and returns an int. assume further
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!