1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
5

The World Wide Web Click on a Description on the left, then click the Term that best fits the Description. Description Technolog

y that lets businesses exchange information about events or products with users who have these readers on their smartphones A technology that uses radio frequencies for tracking but has one-way communication capability A unique tracking code that can create a text message A code that looks like a stack of bars, each bar having a designated number value A concept developed in 2009 that all objects can be tagged, tracked, and monitored through a local network and across the Internet Term RFID Internet of Things barcode NFC QR
Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
5 0

Answer:

Description 1:

Technology that lets ....... on their smartphones.

Corresponding Term: NFC (Near Field Communication)

As it requires readers to be present in smartphones.

Description 2:

A technology that ....... one-way communication capability.

Corresponding Term: RFID (Radio Frequency Identification)

As it is a one-way communication system.

Description 3:

A unique tracking ....... a text message.

Corresponding Term: QR (Quick Response)

It can store alphanumeric data.

Description 4:

A code that ....... designated number value.

Corresponding Term: Barcode

Barcode is made of a stack of bars.

Description 5:

A concept developed ....... across the Internet

Corresponding Term: Internet of Things

Connected devices is the main aim of IOT.

You might be interested in
Complete the function ending_time that determines the final clock time after a task has been completed. The function takes three
Ivanshal [37]

Answer:

  1. def ending_time(hour, minutes, seconds, work_time):
  2.    if((seconds + work_time) // 60 > 0):
  3.        minutes = minutes + (seconds + work_time) // 60
  4.        seconds = (seconds + work_time) % 60    
  5.        if(minutes // 60 > 0):
  6.            hour = hour + (minutes // 60)
  7.            minutes = minutes % 60
  8.    else:
  9.        seconds = seconds + work_time  
  10.    return str(hour) + ":" + str(minutes) + ":" + str(seconds)
  11. print(ending_time(2,30,59, 12000))

Explanation:

The solution code is written in Python 3.

Firstly create a function ending_time that takes the four required input parameters.

Next, create an if statement to check if the numerator of (seconds + work_times) divided by 60 is over zero. If so, increment the minute and reassign the remainder of the seconds to the variable (Line 2-4).

Next, create another if statement again to check if the numerator of (current minutes) divided by 60 is over zero, if so increment the hour and reassign the remainder of the minutes to the variable (Line 6-8)

Otherwise, just simply add the work_time to the current seconds

At last return the time output string (Line 12).

8 0
3 years ago
1. Withdrawal occurs when alcohol is removed from the system after the brain has
Westkost [7]
Experienced it for an extended period of time.
4 0
3 years ago
You have a unique id number, which is represented by the variable id, containing a string of numbers. write a program that conti
koban [17]

idNumber = "123456"
idNo = input("Enter the unique ID number: ")
while idNumber != idNo:
print("This is not your ID number.")
idNo = input("Enter the unique ID number: ")
print("This is your ID number: ", idNo)

Output:

sh-4.3$ python3 main.py                                                                                                                                                                                                                                                

Enter the unique ID number: 2345                                                                                                                                                                                                                                       

This is not your ID number.                                                                                                                                                                                                                                            

Enter the unique ID number: 4563                                                                                                                                                                                                                                       

This is not your ID number.                                                                                                                                                                                                                                            

Enter the unique ID number: 12345                                                                                                                                                                                                                                      

This is not your ID number.                                                                                                                                                                                                                                            

Enter the unique ID number: 123456                                                                                                                                                                                                                                     

This is your ID number:  123456

8 0
3 years ago
Read 2 more answers
1.Siguraduhing _______ang mga datos o impormasyong
Lunna [17]

Answer:

1.maayos

2. Lugar

3. mali

Explanation:

im correct if I'm rwong :-)

7 0
3 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Other questions:
  • When working in excel online, which of the following is considered a conditional formula?
    8·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • You can run a macro by:
    10·1 answer
  • Ryan is working on a document with many secotions. For each section,he wantes to have the title bolded,underlined,an blue. Which
    9·2 answers
  • What is outlook used for?
    14·2 answers
  • ONlY OnE pErcEnT oF pEOpLe CaN sOlvE tHiS!
    7·2 answers
  • A = 250; B = 325. which of the following statements is true? A ==B A&gt;B A =B
    8·1 answer
  • HELP ME?!!?!?!?!?!?
    9·2 answers
  • What do you understand by cloud computing? list the advantages of clould computing.​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!