1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
2 years ago
10

How much data do sensors collect?​

Computers and Technology
2 answers:
liraira [26]2 years ago
8 0

Answer:

2,4 terabits (TB) of data every minute. Sensors in one smart-

Thepotemich [5.8K]2 years ago
3 0

Safety sensors in mining operations can generate up to 2,4 terabits (TB) of data every minute. Sensors in one smart-connected home can produce as much as 1 gigabyte (GB) of information a week.

You might be interested in
Drag the words into the correct boxes
tresset_1 [31]

Explanation:

if you have any doubts or queries regarding the answer please feel free to ask

4 0
2 years ago
What is one similarity between low-and high-level programming languages? (5 points)
aleksandr82 [10.1K]

Answer:

Both high and low level computer languages are used to communicate directly with a computer, so the answer is D.

Explanation:

5 0
3 years ago
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
2 years ago
Which of the following electronic collaboration techniques is the best
muminat

Answer:

D. project management software

6 0
2 years ago
Read 2 more answers
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
2 years ago
Other questions:
  • Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Ex
    9·1 answer
  • Can I change my brainly username?
    9·2 answers
  • Explain why the game of economics has no winner
    8·1 answer
  • Can I have help on this
    7·2 answers
  • Footnotes and endnotes can be used to explain information in more detail, add opinions or comments, or to cite sources in the do
    7·1 answer
  • If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
    11·1 answer
  • What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
    8·1 answer
  • ossless compression tools generally use either Huffman coding or Lempel-Ziv-Welch (LZW) coding. Discuss the advantages and disad
    8·1 answer
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • Please answer that and i'll gave you branlliest
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!