1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
9

____ is a technology that exists inside another device

Computers and Technology
2 answers:
Julli [10]3 years ago
8 0

Answer:

Embedded technology is a technology that exists inside another device.

MaRussiya [10]3 years ago
4 0

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

You might be interested in
___________ key encryption in wep uses the rc4 encryption algorithm.
lora16 [44]

Shared key encryption in wep uses the rc4 encryption algorithm.

7 0
2 years ago
You decide to configure ntp on the router to get time ntp server with an ip address of 172.17.8.254 which commanda should you us
Morgarella [4.7K]
Telenet into the router, authenticate and type enable once the prompt is back type ntp server 172.17.8.254 do this on all routers.
4 0
3 years ago
You can use this effect to break a color into a percentage of its full strength.
Dmitriy789 [7]
The answer on this scenario would then be c. drop out. This effect can be done if one wants to break a color into one's percentage of the full strength. Hope this is the answer and would be of big help.
6 0
3 years ago
You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the
Vlad [161]

Answer:

Spyware

Explanation:

The reason why you noticed your computer has been running slow is because of spyware, which is considered to be very bad to get on your computer. When a user opens his/her web browser, the user receives ads that are misleading to the user, which fools the user of thinking it's something real and not a scam. Not only that, the user also receives pop-up ads that can, as mentioned, trick the user to think that it's real and not fake. Finally, the user's search results will be manipulated. In conclusion, spyware is, in fact, the main cause of the scenario.

4 0
3 years ago
Which heat transfer can be described as currents of warm air rising and cool air falling
erik [133]
Convection would be the answer to thisssss

3 0
3 years ago
Other questions:
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    10·2 answers
  • In Microsoft Word, how would you change the amount of space that is put in after each paragraph?
    15·1 answer
  • It chapter 2 pennywise
    13·1 answer
  • The length property of the String object returns
    15·1 answer
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
    6·2 answers
  • How do i make spaces in python<br> To draw hello world
    15·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the
    5·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!