1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
13

Two technicians are explaining automotive computer control. Technician A says that the volt is used as a signal for a computer-c

ontrol module. Technician B says that automotive computers use amperes to send and receive information. Who is correct?
Computers and Technology
2 answers:
statuscvo [17]3 years ago
8 0
The one who got the correct answer is the Technician A because Automotive computers use voltage<span> to </span>send<span> and receive </span><span>information.</span>
Vikentia [17]3 years ago
3 0

Answer is A. Technician A  is correct.

You might be interested in
Data ____ refers to the accuracy of the data in a database
Brilliant_brown [7]
Accuracy or quality?
7 0
3 years ago
How do you screen shot and copy paste the screenshot from chrome book
Black_prince [1.1K]
Hit the window key + ctrl. You than find the screenshot in your downloads. You click on it and it will say copy. Press it and paste your image where you need to post it on. That’s how you do it!
5 0
4 years ago
Read 2 more answers
Giải thích mục đích của các thao tác open() và close().
kicyunya [14]

Answer:

Which lan is it

8 0
3 years ago
Read 2 more answers
after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
PIT_PIT [208]
To make it useable, the disk first needs to be subdivided into logical volumes, then formate, so that it is readable by the systems.
6 0
3 years ago
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Other questions:
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
    14·2 answers
  • What is required for sitting with your seatbelt on while driving?
    7·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • What is the difference, if any, between an alpha test group and a beta test group? An alpha test group is made up of people asso
    9·1 answer
  • Which of the following is true regarding data analysis? a. Disciplines and professions do not provide guidance on data analysis.
    6·2 answers
  • Define management styles
    14·2 answers
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!