1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
10

Give an example of an embedded systems application.

Computers and Technology
1 answer:
Gala2k [10]3 years ago
7 0

Answer:

A clock in the mobile phone

Explanation:

a clock is a computer in a mobile phone which is a computer,hence it's a computer in a computer

You might be interested in
What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
Stella [2.4K]

Answer:

Tethering and hotspot

Explanation:

Tethering and hotspot are the two different ways by which a laptop could utilize the cellular network connection of a mobile device.

Tethering usually involves connecting the computer or smartphone to the internet with the aid of a USB cable while hotspot involves connection of the device to the internet through the WIFI option.

6 0
3 years ago
Which shape denotes a process to be carried out in a flowchart?
luda_lava [24]

The answer is a rectangle.

6 0
3 years ago
Read 2 more answers
Which one of the following media is most resistant to EMI?
natali 33 [55]

Answer:

D - Fiber-optic Cables

Explanation:

Electromagnetic interference affects cables made from different metals and can corrupt the data running through them. However, Fiber-optic cables are constructed from glass (non-metallic) and transmit pulses of light as signals to transfer data, this means that the cables are most resistant and not susceptible to EMI.

5 0
3 years ago
Instructions written in code that a computer follows are called:
seraphim [82]

\bold{Answer:}

Instructions written in code that a computer follows are called software programs.

4 0
3 years ago
Meats ages hair and feathers all contain this monomer
OverLord2011 [107]

Answer:Amino Acid

Explanation:

All proteins have amino acids

7 0
3 years ago
Other questions:
  • Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
    13·1 answer
  • A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
    14·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a
    15·1 answer
  • Management of software development consist of?
    15·1 answer
  • FFFFFFFFFRRRRRRRRRRRRRRRRRREEEEEEEEEEEEEEEEEEEEEEE
    10·2 answers
  • Write a Scientific report modeling a written reasearch paper on big data applications.​
    6·1 answer
  • I need help please !!!!
    12·1 answer
  • Where is the third vanishing point in the three point perspective
    8·1 answer
  • What if you accidentally delete your browser history
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!