1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
11

WHO HAS TWITCH PLS FOLLOW ME MY TWITCH IS giaplayzgamez I'm uploading Videos Soon.

Computers and Technology
2 answers:
Mumz [18]3 years ago
8 0

Answer:

Cool

Explanation:

Paraphin [41]3 years ago
6 0
Coolio said he had a little bit of a
You might be interested in
You are asked to add speech to a robotic receptionist that sits at the front desk of a large organization. The robot has an anim
Firlakuza [10]

Explanation:

The requirements would be that the receptionist robot detects the incoming person and speak;

<em>Good morning (based on time), Welcome to XYZ organization. How can i help you. Do you need to visit HR, finance, marketing, sales, engineering etc representative or other function?</em>

Now based on that a visitee information is printed out.

Limitation

A person comes who does not understand what robot speaks

Interaction with existing dialogue would be made possible through speech recognition system

The system will work well as speech recognition has now been used in many functions and robots have also now become quite advanced

7 0
3 years ago
Read 2 more answers
Explain why interrupt times and dispatch delays must be limited to a hard real-time system?
BigorU [14]

Answer:

The important problem is explained in the next section of clarification.

Explanation:

The longer it is required for a computing device interrupt to have been performed when it is created, is determined as Interrupt latency.

The accompanying duties include interrupt transmission delay or latency are provided below:

  • Store the instructions now being executed.
  • Detect the kind of interruption.
  • Just save the present process status as well as activate an appropriate keep interrupting qualitative functions.
7 0
3 years ago
A template class is a class in which ___________.
Romashka [77]

Answer: (A) At least one type is parameterized

Explanation:

 A template class is the type of class in which the one type are parameterized atleast in each template class. The template class mainly provide the various type of specifications so that it can generate the class based on the different types of parameters.

A template class is basically initialized by passing the template argument in the given types. In this type of class atleast one type is defined as the generic type.

Therefore, Option (A) is correct.

6 0
3 years ago
Read 2 more answers
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
Define a function OutputValues() that takes two integer parameters and outputs all integers between the first and the second par
iris [78.8K]

Answer:

#include <iostream>

using namespace std;

void OutputValues(int n1, int n2) {

 for (int i = n1; i <= n2; i++) {

   cout << i << endl;

 }

}

int main() {

 int num1;

 int num2;

 cin >> num1 >> num2;

 OutputValues(num1, num2);

 return 0;

}

Explanation:

8 0
3 years ago
Other questions:
  • If an employee who needs eye protection wears prescription lenses he or she should
    14·1 answer
  • URGENT!! You decide not to use any recipes or information from the "Don't Be an Animal Murderer" Web site. What characteristic o
    7·2 answers
  • What means can a worm use to access remote systems to propagate?
    7·1 answer
  • If r is an instance of the above Person class and oddNum has been declared as a variable of type boolean, which of the following
    8·1 answer
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    6·1 answer
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • 1. Multiple Choice(25 points) 1) 4’b1001 represents the following decimal number______________ a) 8 b) 9 c) 10 d) 11 2) The foll
    10·1 answer
  • Which of the following describes the operating system?
    10·1 answer
  • Is this very epik or not?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!