1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
12

Who uses super computer

Computers and Technology
1 answer:
Delvig [45]3 years ago
3 0
Aerospace, petroleum, and automotive industries
You might be interested in
Which source would provide the best way to find valid information about climate change
igor_vitrenko [27]
Primary sources would be best
4 0
3 years ago
A mobile phone app asks the user to point the phone's camera at a room and then applies the phone's lidar scanning function. wha
Tamiku [17]

The technology above,  measures distances between objects to create a virtual representation of the room.

<h3>What is the LIDAR technology?</h3>

This is known to be a tech that helps one to use the app to take a numbers of measurements of the room, by giving the app the ability to calculate the size and shape of the said room.

Therefore, The technology above,  measures distances between objects to create a virtual representation of the room.

See options below

what does this technology do?

a. measures distances between objects to create a virtual representation of the room

b. scans the room to locate and connect to other extended reality enabled devices

c. records a video of the room and automatically adjusts the brightness and color balance

d. optimizes the frame rate of the phone's display based on the strength of the network

Learn more about phone app from

brainly.com/question/917245

#SPJ1

8 0
2 years ago
One of the most notable impacts of IT on business is improved
Igoryamba

One of the most notable impacts of IT on business is improved efficiency  of security communication.

<h3>What is security communication?</h3>

Security Communication Systems are said to be a vital aspect or part of works as well as in security mitigation measure.

The use of security communication in any organization is known to be the use of security tools to be able to keep the organization safe from any form of attack.

Note that One of the most notable impacts of IT on business is improved efficiency  of security communication as it boast security of data.

Learn more about security communication  from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
Under what driving conditions will 2019 Nissan LEAF’s available Rear Cross Traffic Alert (RCTA) warn the driver if a vehicle is
Dmitriy789 [7]

Answer:

When the driver is <em>reversing the car</em>

Explanation:

The Rear Cross Traffic Alert (RCTA) is Nissan's <em>risk  of collision detector</em> that warns drivers if one or more cars are approaching the rear of your car when backing up from a parking space.  

Sensors around the back of the vehicle identify vehicles drawing nearer from the either way. A notice tone and glimmering light will appear and  alert the driver to stop.  

5 0
3 years ago
Which of the following is not a characteristic of Web 2.0?
Dmitry [639]

Answer:

c. mentorship programs taking place via the internet

Explanation:

The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.

Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.

Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.

Some of the main characteristics of Web 2.0 are;

I. Social networking.

II. Blogging.

III. Interactive comments being available on many websites.

Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.

However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).

7 0
3 years ago
Other questions:
  • Which type of software is created and updated by a worldwide community of programmers and is available for​ free?
    14·1 answer
  • One day a subcontractor calls him saying that he needs a replacement check for the job he completed at 1437 Elm Street. Jonathan
    14·1 answer
  • At the top level of a tree is a single node called the ________ a)pinnacle b) root c) top d)front
    12·1 answer
  • What is the importance of personal computers in connecting to the internet ?
    13·2 answers
  • Computer-generated random numbers are normally distributed. true or false
    11·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • (a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many
    10·1 answer
  • Can anyone talk to me?
    9·2 answers
  • he memory protection requirement must be satisfied by the operating system rather than the processor. True False
    14·1 answer
  • An outpatient provides the following id: barbara jones, birth date 8/15/63. should a specimen be collected for this lab order?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!