1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
13

When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by st

anding in front of it. Which emerging technology does Cloud combine with to enable this medallion's features?
Computers and Technology
1 answer:
Virty [35]3 years ago
8 0

Answer:

The Ocean Medallion.

Explanation:

The Ocean Medallion is a handheld interface that, on boarding a cruise liner, digitally attaches to multiple devices. They could order a cocktail with their mobile or instantly open the cockpit door by walking in front of something while a guest wears the ocean medallion.

You might be interested in
Write the half function. A function call and the functionprototype
EastWind [94]

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

  • This method is called call-by-reference method.
  • Here when we call a function, we pass the address of the variable instead of passing the value of the variable.
  • The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main().
  • Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

3 0
3 years ago
List out analog computer​
Fynjy0 [20]

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

5 0
3 years ago
Enumeration can be used to discover all but which of the following types of information?
Ostrovityanka [42]

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

3 0
3 years ago
When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive fo
disa [49]

Answer:

great enough to overcome.

Explanation:

Kinetic energy can be defined as an energy possessed by an object or body due to its motion.

Mathematically, kinetic energy is given by the formula;

Where, K.E represents kinetic energy measured in Joules.

M represents mass measured in kilograms.

V represents velocity measured in metres per seconds square.

A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.

When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.

Basically, the phase change includes solid, liquid and gas.

8 0
3 years ago
How to trap a private number​
Papessa [141]

Answer:

Explanation:

       ?

4 0
3 years ago
Read 2 more answers
Other questions:
  • Marissa works at a company that makes perfume. She noticed many samples of the perfume were not passing inspection. She conducte
    6·2 answers
  • What is a main cause of a virus on a computer
    6·1 answer
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett
    8·1 answer
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,
    9·2 answers
  • Bob has 2 candy bars he is fat what hapennes
    5·2 answers
  • Friday Night Funkin Fans, does this count as a leak if I share it?
    13·2 answers
  • HELP MY TABLET KEEPS ON REBOOTING I TRIED TO FACTORY RESET BUT IT KEEPS ON REBOOTING
    12·2 answers
  • Arrange the computers in the order fastest to slowest: Minicomputer, Supercomputer, Personal Computer and Mainframe.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!