The interactive model of communication states that the people and the environment for communication are constantly changing.
B. interactive
<u>Explanation:</u>
The world is a big place and you must have come across the infamous hearing, "Change is the only constant". Gradually, with the passage of time, the mindset of the people change over a certain topic for communication.
For instance, in old times, people did not prefer their children to have love marriages, in fact India has also seen honor killings to prevent love marriages. But now most portion of the society stands in favor of love marriages. People change, perspective change, and so does the perception and ideas.
An embedded computer is designed to perform a certain function and it is a component of a larger system.
An embedded computer has a dedicated function within a larger system and is incorporated as a part of a complete system rather than being a stand alone computer.
It is a microprocessor, micro controller based real time control system.
Its a combination of hardware and software that have a dedicated function to achieve a specific task. The also have peripheral devices for communication purposes.
Digital Camera
, ATM, Calculator, Digital Watch
, Self-autonomous Vehicles, Security Camera
, Washing Machine
, Mp3 player, Microwave Oven
, Fire Alarm, Smart Phone,Vending Machines, networking hardware like dedicated routers etc are examples of embedded systems.
Embedded computers are less expensive to produce, consumes less power, easier to maintain, do not require remote maintenance and easily customizable.
Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message