1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
8

The Jacquard Loom used ______________ to change the operation of the loom.

Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
8 0

Answer:a machine loom

Explanation:

You might be interested in
Can someone help me with this pls
Dimas [21]

I know the first one shown in the picture but I can't see the one under it I can help you if you can show the whole problem under the first problem.

5 0
3 years ago
Read 2 more answers
Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
Masja [62]

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

4 0
3 years ago
True/False/Unknown. For the interpretation of function calls, we assign the formal parametersto the valuations of the actual arg
alisha [4.7K]

Answer:True

Explanation:Calling a Function.

A function is created by defining what that function needs to do. In order to utilize that function one has to do that task defined in that function. A called function is the one that carries on the defined task

Parameters need to be passed with the function name in order to call a function,the value returned by a function is then stored.

5 0
4 years ago
How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
Ganezh [65]
Unless you share the backup HD only the local user is going to see it. Given that it's a server, it's not a problem. You can also hide the backup with attributes +h +s and many other ways.
8 0
3 years ago
A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
BARSIC [14]
The answer is A) digital signature
8 0
3 years ago
Other questions:
  • HELP I don't understand this
    14·2 answers
  • On Gmail, can I have an email get sent to someone at a certain time?
    7·1 answer
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • The Fibonacci numbers are the numbers
    15·1 answer
  • How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
    14·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • What are two variables is figure 1 comparing
    10·1 answer
  • Please help! 40 points + Brainliest!
    8·1 answer
  • Which attack intercepts communications between a web browser and the underlying computer?
    10·1 answer
  • Magnetic video tape in a plastic casing is a?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!