1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
11

Which recorder is least recommended in automation anywhere?

Computers and Technology
2 answers:
11Alexandr11 [23.1K]3 years ago
6 0

The least recommended recorder in automation is Smart Recorder.

Further explanation:

Automation: It is the process of programming a machine to perform operation by itself.

There are mainly three types of automation in the recorder:

  1. Smart Recorder
  2. Screen Recorder
  3. Web Recorder

Smart Recorder: This is an advance recorder which is best for desktop applications. Smart Recorder is also known as Object Recorder. The main function of Smart Recorder is to capture and control the list boxes, drop down menus, mouse clicks, radio buttons and check boxes etc.

Screen Recorder: Screen Recorder provides the simplest way to create easy automation processes since it captures keystrokes and mouse clicks during the completion of a process. It is also known as standard recorder.

Web Recorder: It is used in web applications. Web Recorder requires to extract the data from the websites.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: College Engineering

Subject: Computer Science and Engineering

Chapter: Automation

Keyword:

Automation, least, recommend, screen recorder, smart recorder, web recorder, object recorder, desktop applications, capture, control, drop down menu, radio button, mouse click, check box, key stroke, standard recorder, process, recorder

raketka [301]3 years ago
4 0
<h2>Answer:</h2>

<u>Screen recorder</u><u> is the least recommended one</u>

<h2>Explanation:</h2>

There are three types of recorders. They are Smart Recorder, Web Recorder and Screen or sometimes called Standard Recorder. Smart Recorder is used for desktop applications while Web recorder is used for Web-based applications. The least recommended one is Screen Recorder which is used for building simple tasks that involves few mouse clicks and keystrokes. It works by capturing screen co-ordinates and therefore, no calibration is taken into account. It is generally used when you plan to run the task on the same machine on which, it was recorded.

You might be interested in
: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
Alexeev081 [22]

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

8 0
2 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
What is meant by the term drill down?
andrezito [222]

Answer:

 The drill down term is basically used in the information technology for the explore the multidimensional information or data by navigating the different layers of the data from the web page applications.  

Drill down basically involve in the database by accessing the specific information through the database queries. Each query basically increase the data granularity. This term is also involve with the link for represent the details more specifically.

The drill down is the simple approach or technique for dividing the complex problems into small parts so that it make the technique more efficient.

7 0
3 years ago
Order the steps for accessing the junk email options in outlook 2016
Zinaida [17]

Answer:

What is the question here? lol

Explanation:

8 0
3 years ago
Roses are red, violets are blue, I'm going to ki.ll myself, to make life better for you.
Shtirlitz [24]

Answer:

i like this poem helps out the world

Explanation:

p,s. deserves brainiest

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is a device driver?
    9·2 answers
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • Myles is studying a system to lessen the number of complaints about the Help Desk. He has formally studied the service counter a
    5·1 answer
  • Consider the following code snippet:
    13·1 answer
  • 31
    10·1 answer
  • Darla is going to start writing the HTML code for a web page. What would she start with?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!