1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
6

Ten(10) examples of wearables or wearable technologies?​

Computers and Technology
1 answer:
Semmy [17]3 years ago
7 0

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

You might be interested in
Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
guapka [62]

Answer:

---------------------------

Explanation:

4 0
3 years ago
How does a router differ from such devices as repeaters, bridges, and switches?
irina1246 [14]

Answer: Please see below as the answer is self-explanatory

Explanation:

Repeaters, bridges and switches, route packets only within the limits of  their own physical networks, using the physical hardware addresses of the different devices connected to the network.

On the contrary, routers are devices that interconnect physical networks, with one physical interface per each network to which the router is connected to.

Routers use logical addresses -called IP addresses in the TCP/IP suite, which operate at the network level, and take charge of the delivery of packets beyond the network that originated it, based on the IP address of the destination host.

Only when the IP destination address is within the same physical network as the router, it transforms the IP datagram in a Frame and sends it using the physical hardware address of the host.

8 0
4 years ago
What is the difference between a Is your Milling machine and grinding machine
Law Incorporation [45]

Answer:

one is used for milling and one is used for grinding

Explanation:

8 0
3 years ago
Which two computer peripherals are connected to the computer through a port?
chubhunter [2.5K]
Most computer devices are connected to the computer through port
Keyboard through usb port
Printer through usb port
Hand point device through usb port
Also computer equipped with LPT port for printers and COM port for additional devices like external modems e.t.c
7 0
4 years ago
Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numb
Aleksandr [31]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts whatever you want such as required for writing a book- easily.

The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.

Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.

3 0
3 years ago
Other questions:
  • Solve system of equations. <br>x+2y-z=4<br>2x-y+3z=8 <br>-2x+3y-2z=10
    12·1 answer
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • _____ is the management function that monitors the performance of the firm and makes improvements when necessary
    15·1 answer
  • Big Project, Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly
    9·2 answers
  • Hoda is creating a report in Access using the Report Wizard. Which option is not available for adding fields using the wizard?
    15·2 answers
  • How is internet connection made possible.​
    7·1 answer
  • List six features of the Microsoft ​
    10·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!