1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
5

Embedded operating systems control?

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
6 0
I think the answer is the First one
You might be interested in
Who is GodLJonathan?​50 FREE POINT$!!
Irina-Kira [14]

Answer:

i don't know..

..goo gle it ...............

6 0
3 years ago
Read 2 more answers
Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co
Novay_Z [31]
<span>'m pretty sure the big O is actually O(log n) Not really a proof but anyway. If you write out the values before each iteration of the loop you get. L - iteration number L i t 1 1 0 2 1 2 3 3 6 4 9 18 5 27 54 6 81 162 So if n was 80 it would take 6 iterations You can see i is growing like 3^(L-2) So if n was 1000 1000 = 3^(L-2) log(1000) [base 3] = L - 2 log(1000) [base 3] + 2 = L 8.287709822868152 = L and if you ceil the answer you get L = 9 and just to check with the table 6 81 162 7 243 486 8 729 1458 9 2187 ... The table isn't perfect but hopefully you get the main idea.</span>
6 0
4 years ago
What is the process in which a server is partitioned into smaller components virtually
Shkiper50 [21]

virtualization is the process in which a server is partitioned into smaller components virtually.

6 0
3 years ago
Read 2 more answers
Regardless of how storage devices are connected to a computer, ____ and/or names are typically assigned to each storage device
Masja [62]
Regardless of how storage devices are connected to a computer, letters of the alphabet and/or names are typically assigned to each storage device
5 0
3 years ago
Which one of these statements about digital signatures is true? A digital signature:
lbvjy [14]

Answer:

<h3>A. Is used to add a personal touch to e-mail messages.</h3>

Explanation:

<h3>A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). ... Digital signatures are significantly more secure than other forms of electronic signatures.</h3>

4 0
3 years ago
Other questions:
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT
    6·1 answer
  • TP is commonly used to __________ and __________ files to a server.
    5·1 answer
  • True false) cad means computer aided manufacturing​
    10·1 answer
  • Which method of traversing a tree would result in a sorted list for a binary search tree?
    11·1 answer
  • Write a Comparator that compares String objects by the number of words they contain. Consider any nonwhitespace string of charac
    15·1 answer
  • Which statement best describes an academic goal?
    14·2 answers
  • 30points!!!! Plz answer quickly
    5·2 answers
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • What is window system?<br>​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!