1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
6

3. How do robots help speed up the fulfillment of orders at some Amazon warehouses?

Computers and Technology
2 answers:
vagabundo [1.1K]3 years ago
6 0

Answer:

B is the only answer that makes sence

Vitek1552 [10]3 years ago
6 0
I think c is the answer.
You might be interested in
Which of these is most likely to contribute to the long term of a local ecosystem?
maria [59]
I would help but you didn’t say what these is
8 0
2 years ago
Today encoding scheme has taken over ascII by what
harkovskaia [24]
I do not know, i really hope you dont fail!!!!!!!!!
7 0
4 years ago
how would you determine if your employer or school has Network monitoring software? would you change your computer activities in
Maslowich

Answer:

It would be hard to tell if you were being monitored by a network monitoring software, however, you could use a VPN to avoid it. Whenever on a public network you should never use passwords and sign in to things like your online banking.

7 0
2 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Which of the following is not a common operating system? A) Apple B) Linux C) Unix D) Windows Vista​
sleet_krkn [62]

Answer:

A) Apple

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

Apple is not a common operating system.

However, MacOS is an operating system that is designed and developed by an American multinational technology company called Apple Inc.

5 0
3 years ago
Other questions:
  • Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
    13·2 answers
  • Complete the following sentence.
    13·2 answers
  • Which of the following is not true of both the ACT and the SAT?
    11·2 answers
  • What mass of nh3 can be made from 35g of n2?
    14·1 answer
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Middleware is software used to: a. connect processes running on different computer systems across a network. b. integrate a comp
    8·1 answer
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • Tonya is photographing an old photo with her digital camera. What can she use to avoid reflections
    15·1 answer
  • Decribe the advantages of using emails compared with physical faxing ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!