1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
10

Google Pay utilizes smartphones with near field communication technology, such as _____, to allow shoppers to swipe their phone

at checkout to pay for items.
Computers and Technology
1 answer:
gregori [183]3 years ago
4 0

Answer:

RFID (radio frequency identification)

Explanation:

Radio Frequency Identification makes use of electromagnetic fields to automatically identify and track tags attached to objects. The tags holds electronically stored information. A RFID tag can be passive, that is, only tracks tags that are very close to it and needs no power, or Active, that is, it needs small battery power and can track tags close to 100 meter way. It does not need a line of sight to track, which makes it better to use in phones and other hand held devices.

With this technology, a shopper can automatically pay for items at checkout points.

You might be interested in
4
bixtya [17]

Answer: its keyword

Explanation:

4 0
3 years ago
Which of the following is LEAST needed when programming a computer?
PtichkaEL [24]
Computer language is essential
6 0
3 years ago
Which sentences in the passage correctly describe a function?
quester [9]

Option D is correct.

Explanation :

  1. In option A, it is not mandatory that a function will have arguments and it will return a value.
  2. In option B, no formula begins with =.
  3. In option C, it is not necessary to begin with /.
  4. In option D, MAX function should return maximum value in the set given.

Thus, option D is correct because arguments of a function are always enclosed within parentheses

Example:

SUM (30,70)

8 0
3 years ago
Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.
miv72 [106K]
"debugs" is the answer
4 0
3 years ago
Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to
kakasveta [241]

3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.

Respuesta: la clave con el mensaje :

5 0
2 years ago
Other questions:
  • Two electronics technicians are measuring electrical quantities in circuits. Technician A says that copper, glass, porcelain, an
    11·1 answer
  • What is a help desk
    15·1 answer
  • HELP ASAP
    9·1 answer
  • An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the
    11·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • Breaking code rules is only a problem once in a while. Group of answer choices True False
    12·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • HELP ASAP Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players.
    10·2 answers
  • GOOD EVENING, FRIENDS, I WANT TO ASK ON THE ACCOUNT OF HIS NAME‏BENJEMIN360 . THIS ANSWERS ARE VERY WONDERFUL, BUT I CAN'T COMMU
    6·1 answer
  • When troubleshooting a network issue where a single host is unable to connect to the network, what is the first thing you should
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!