Answer:
The answer is hybrid computer coz it is the combination of both analog and digital computers
Explanation:
hope it helps
good day
Answer:
An embedded system is a part of a larger system which has either one or a limited number of dedicated functions.
It doesn't require much power to run and is cheap to make and design.
Explanation:
Examples include: cars, microwaves, traffic lights, washing machines, phones etc
Answer:
ASK
Explanation:
The correct answer is ASK which denotes Amplitude Shift Keying. This is essentially a type of amplitude modulation which represents the binary data that comes varied forms right in the amplitude of a signal.
Now the reason why It is the most susceptible technique to noise is due to the fact that between frequency, phase & amplitude, amplitude is the one that is most susceptible to being affected by noise when compared to the other two.
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.