1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
8

What is telepresence

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
7 0
The use of virtual reality technology, especially for remote control of machinery or for apparent participation in distant events.
You might be interested in
What if an html code became cracked and formed a bug how can i repair that
Valentin [98]
I suggest you look up a video for it ofc
7 0
3 years ago
How is a flow chart used?what are some advantages and disadvantages to using one for software
Mars2501 [29]

Answer: See explanation

Explanation:

A flowchart simply means the representation of a computer program in graphics. In flowchart, the relationship in the program are been defined by using geometric symbols like arrows, oval shapes and rectangle.

Advantages of flowchart include cost reduction, faster and easier way of communication, it also facilitates troubleshooting and helps in the promotion of logical accuracy.

Disadvantages include the fact it is expensive and also because it is not easy to manage.

7 0
3 years ago
Which of the following are examples of unstructured data?
Dafna11 [192]

Answer:

social media

Explanation:

this includes text, audio, images, and video.

6 0
2 years ago
Read 2 more answers
Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Archit
likoan [24]

Answer:

Using Network Access Control Lists (ACL) to allow/deny traffic based on application IP addresses

Explanation:

ALL Network Access Control List has has distinct inbound and outbound rules.

Each of these rules are configured to either allow or deny traffic.

This is the best and easiest way to achieve the task at hand.

The Network ACL will be configured to allow inbound and outbound traffic for Application A to send and receive requests and only inbound traffic will be allowed for Application B to receive requests only from A

5 0
3 years ago
Uhmm... So like I am trying to login on this account to my phone and I forgot my password... how do I recover it... I am literal
Degger [83]
Try using your email to sign in then press “forgot password” then re set it through email!!
5 0
3 years ago
Read 2 more answers
Other questions:
  • Suzy lives alone I. New York where her family lives In Florida
    10·2 answers
  • Merry Mint Pickaxe Giveaway<br><br>Username And Password <br><br>This is actually legit
    7·2 answers
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Which of the following Web 2.0 tools can aid in searches using key words? (1 p
    11·1 answer
  • Write one similarity and one difference between '_' (underscore) ' % ' wildcard symbol .
    11·1 answer
  • 35 POINTS
    10·1 answer
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • Weaknesses about ICT Technician
    9·1 answer
  • Explain two ways that you can create a header.
    14·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!