1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
7

A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless

Computers and Technology
1 answer:
yulyashka [42]3 years ago
7 0

Answer:

Internet of things

Explanation:

Smart refrigerators are equipped with IoTs which helps to sense when one is running low on milk and sends a reminder through a wireless connection.

Internet of things is connectivity or network of things.

  • It involves connection of different computing everyday devices which are able to interact with one another.
  • They have found a wide range of application in our hospitals, homes, and even work places.
  • The connectivity allows for more flexible controls and interaction wherever one might be with different components.
  • It uses a network of objects that exchanges data intermittently.
You might be interested in
A process is: An activity of a function that is performed for some specific business reason A single piece of data within a syst
ankoles [38]

Answer:

An activity of a function that is performed for some specific business reason.

Explanation:

A set of actions to achieve a particular task is called process.

<u>Definition</u>

Process is the actions happening while something is happening or being done.

<u>Example </u>

1. Process is the steps taken by someone to clean a kitchen.

2. Collection of action items to be decided on by government committees.

7 0
3 years ago
Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
svetlana [45]

Answer:

Usually, it's because of taxes and insurance.

3 0
4 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
A portable electronic device that can be used in an emergency to stop someone’s heart from going out of rhythm is called a/an
JulsSmile [24]
It is called a Heart pace maker
7 0
4 years ago
Read 2 more answers
If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
Lerok [7]

Answer:

Correct Answers: 01h 79h 1Bh 78h 78h 1Bh 7Ah 04

Explanation:

Solution is attached below

4 0
3 years ago
Other questions:
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • For the MIPS assembly instructions below, what is the corresponding C statement? Assume that the variables f, g, h, i, and j are
    15·2 answers
  • Where would you go to cancel a print job?
    15·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • Murray University invested over $450,000 in a customized learning management system so that professors could put courses online
    9·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • The function ________ returns a value or reference of the cell at the intersection of a particular row and column in a given ran
    14·1 answer
  • Under the fair use doctrine, which group of people are allowed to use certain
    7·1 answer
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!