1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
9

The first project that this position will work on is an embedded sensor that will send readings periodically to the cloud, and h

ave the information accessible to certain users though a web page. What tools, languages, services and design patterns would you use to accomplish this?
Computers and Technology
1 answer:
Mice21 [21]3 years ago
6 0

Answer:

we need PLC(Programmable Logic Units) attached to the sensors  and those sensors will take the signals/values  and transfer them to the cloud .In cloud we store that information and send that information to the web application where user is able to view

Explanation:

it looks like a SCADA system. we can integrate PLC with SCADA

or

for developing PLC we can use c or c++.it contain logic to transfer data to cloud

for cloud storage we can use Microsoft azure which is useful for data storage in sql servers

for web application we can use ASP.Net to interact with cloud and get data from there and display the results to the user on UI

You might be interested in
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network v
finlep [7]

Answer:

Network Printer

Explanation:

A network printer is a type of printer that is accessible by network connections, making it available for use by other computers connected to that network. The network can either come from the printer or from a local computer provided to create network for the printer. Most of them contains a network interface card that allow them connect directly to a local network from which computers can then access them. This is different from a local printer that is directly connect to the computer via USB cable.

Network printer is very advantageous in that multiple network computers can access the printer at thesame time.

7 0
3 years ago
A customer dictates instruction on how to transcribe audio. Do you have to transcribe the instruction word for word?
Ostrovityanka [42]

Answer:

No

Explanation:

4 0
3 years ago
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
algol [13]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
3 0
3 years ago
Which one of these is NOT a successful budgeting strategy?
Elina [12.6K]
Answer D isn't a successful budgeting strategy.
7 0
4 years ago
Read 2 more answers
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Other questions:
  • I need an answer fast !!! (APEX)
    13·1 answer
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • 1. In the.js file, write the JavaScript code for this application. Within the click event handlers for the elements in the sideb
    14·1 answer
  • Which password is an ideal and secure password?
    6·2 answers
  • A python keyword______.
    6·1 answer
  • Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
    6·1 answer
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • What starts with p and ends with orn
    15·2 answers
  • Q2: Mark True or False in the corresponding Answer sheet (0.5 point each)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!