1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
9

____ is a technology that exists inside another device

Computers and Technology
2 answers:
Julli [10]3 years ago
8 0

Answer:

Embedded technology is a technology that exists inside another device.

MaRussiya [10]3 years ago
4 0

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

You might be interested in
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
Can you guys help me with this coding assignments?
kicyunya [14]

Explanation:

x ==50

while x< 100;

x -= 1

8 0
3 years ago
Will mark brainliest plzz help
n200080 [17]

Answer:

planes

rendering engine

coordinate

frame range

i could be wrong....

5 0
3 years ago
the mail merge feature can be used to address the same letter to several different people , true or false
sergij07 [2.7K]
The answer is that it is true.
4 0
3 years ago
Read 2 more answers
How can you get to the Excel Function Reference information? Check all that apply.
garik1379 [7]

Answer: Help tab, F1, tell me bar

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • And computers are the most commonly seen microcomputers.
    10·1 answer
  • Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
    15·1 answer
  • Which of the following factors will have the greatest impact on your credit score? I. Length of Credit History II. Payment Histo
    6·2 answers
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
    14·1 answer
  • What are the peripherals of a computer ​
    12·1 answer
  • Edward is a composer and needs to listen to the most accurate music files to create his compositions. What audio file type shoul
    10·1 answer
  • 500 word career report, auto care
    15·1 answer
  • How to paste picture in word without moving table.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!