1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
15

This sensor is used for burglar alarmsA. temperatureb. humidityc. movementd. PH​

Computers and Technology
1 answer:
bogdanovich [222]3 years ago
8 0

Answer:

C

Explanation:

Have a great summer :)

You might be interested in
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
Which technology do online storesusually use to present customized content?
k0ka [10]

Answer:

real time analytics technology

Explanation:

Online stores usually use real-time analytics technology to present customized content. Explanation: Real-time analytics is gaining popularity nowadays. It is basically the procedure of measuring and preparing the data as it enters the database

8 0
3 years ago
Think of a recent occasion when you became upset with a friend or family member. How did you handle the situation? How did you c
bekas [8.4K]

Answer:

You would identify the problem together with the person or persons involved.

Explanation:

4 0
3 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
Mention any four features which a standard computer laboratory should have​
Vera_Pavlovna [14]

Answer:

•Make sure doorway openings are at least 32 inches wide and doorway thresholds are no higher than 1/2 inch.

•Keep aisles wide and clear for wheelchair users.

•Make sure all levels of the lab are connected by a wheelchair-accessible route of travel.

For students with mobility impairments, make sure there are procedures in place for retrieving materials that may be inaccessible.

Make sure ramps and/or elevators are provided as an alternative to stairs. Elevators should have both auditory and visual signals for floors. Elevator buttons should be marked in large print and Braille or raised notation and easily reachable for wheelchair users.

Locate the lab near wheelchair-accessible restrooms with well-marked signs.

Service desks need to be wheelchair-accessible.

Provide ample, high-contrast, large-print directional signs throughout the lab. Mark equipment in the same fashion.

Provide study carrels, hearing protectors, or private study rooms for users who are easily distracted by noise and movement around them.

Provide at least one adjustable-height table with easily reachable controls for each type of computer.

Have wrist rests available to those who require extra wrist support while typing.

Keep document holders available to help users position documents for easy reading.

5 0
3 years ago
Read 2 more answers
Other questions:
  • which student organization helps students with career development by having them become interms to sponsor conferences?
    9·1 answer
  • A network administrator is using packet tracer to mock up a network that includes iot devices. What can the administrator do fro
    15·1 answer
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • What is a disadvantage of using transitions in a PowerPoint presentation?
    9·1 answer
  • WILL UPVOTE <3
    9·1 answer
  • Given the following sequence of integers: 12, 19, 10, 4, 23, 7, 45, 8, 15 Build a heap by inserting the above set, one integer a
    8·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
  • Briefly explain specialisation?​
    11·1 answer
  • EASY What does the Backspace key do?
    6·1 answer
  • What are some of the most common obstacles in video games?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!