1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
10

Google Pay utilizes smartphones with near field communication technology, such as _____, to allow shoppers to swipe their phone

at checkout to pay for items.
Computers and Technology
1 answer:
gregori [183]3 years ago
4 0

Answer:

RFID (radio frequency identification)

Explanation:

Radio Frequency Identification makes use of electromagnetic fields to automatically identify and track tags attached to objects. The tags holds electronically stored information. A RFID tag can be passive, that is, only tracks tags that are very close to it and needs no power, or Active, that is, it needs small battery power and can track tags close to 100 meter way. It does not need a line of sight to track, which makes it better to use in phones and other hand held devices.

With this technology, a shopper can automatically pay for items at checkout points.

You might be interested in
Explain how can you protect your computer from malware
rosijanka [135]
Trend micro security for your Mac or pc or trend micro mobil security for your android or iOS Mobil device?

Hope this helps!
6 0
3 years ago
Read 2 more answers
DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
otez555 [7]

Answer:

D) can access main memory at the same time as the main CPU

Explanation:

DMA is short for Direct Memory Access, these controllers allow the device to transfer data directly to and from the memory modules without interfering with CPU processes. Therefore it can access main memory at the same time as the main CPU. Thus freeing up CPU processing power for other tasks while also retrieving the data necessary.

8 0
3 years ago
On a leading-trailing system technician A says that both shoes do equal work when stopping while going in reverse. Technician B
sleet_krkn [62]

Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.

<h3>How many brake shoes function?</h3>

There are known to be two shoes function that are said to be working a way where both become either the trailing shoe or leading shoe based on whether the vehicle is moving forward or backward.

Therefore we can say that, Based on the scenario above about the leading-trailing system Both technician A and B are incorrect.

Learn more about trailing system from

brainly.com/question/14367881

#SPJ1

5 0
1 year ago
To provide for unobtrusive validation, you can install the ____________________ package for unobtrusive validation.
NARA [144]

Answer:

AspNet.ScriptManager.jQuery?

Explanation:

Unobtrusive validation means we can perform a simple client-side validation without writing a lot of validation code by adding suitable attributes and also by including the suitable script files.

One of the benefits of using a unobtrusive validation is that it help to reduce the amount of the Java script that is generated. We can install the AspNet.ScriptManager.jQuery? for the unobtrusive validation.

When the unobtrusive validation is used, validation of the client is being performed by using a JavaScript library.

4 0
3 years ago
Complete the program by writing and calling a function that converts a temperature from Celsius into Fahrenheit. Use the formula
Rina8888 [55]

Answer:

C = int(input("Enter a number ::))

F = (C * (9 /5)) + 32

print(" {} in Fahrenheit is {} ". format(C, F))

Explanation:

The program takes an input from the user and converts the input to a fahrenheit.

4 0
3 years ago
Other questions:
  • Where are Micro USB connectors used the most?
    11·2 answers
  • Dust buildup inside a desktop PC case can be managed effectively by ____.
    7·2 answers
  • Using either a UNIX or a Linux system, write a C program that forks a child process that ultimately becomes a zombie process. Th
    8·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
    6·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • If you wanted a smartphone with the fewest restrictions on application development which smartphone operating system should you
    9·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!