1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
11

What is a technology that exists inside another device called

Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
7 0

Answer: embedded technology

Explanation: just took the test

You might be interested in
The ________ of the operating system enables users to communicate with the computer system. Select one: A. user interface B. mod
Mumz [18]
The user interface of the operating system
8 0
3 years ago
A set of independent computer systems interconnected by telecommunication links for the purpose of sharing information and resou
STALIN [3.7K]

Answer:

Network

Explanation:

  • A computer network is a set of computer systems also called nodes which are connected together via communication channels.  
  • These communication links can be telephone lines, modem (in old times) and nowadays these communication links are broadband, digital subscriber line DSL, cables, radio waves etc which are the communication links used for transmitting digital signals. Every communication link has its own data transmission speed. For example Fast Ethernet can provide data rate of 100 mbps and use coaxial cables, twisted pair cables and fiber optic cables.
  • Now what can be the nodes? These can be devices from a PC to a laptop computer or a smart phone etc.
  • The main purpose of a computer network is to share resources, communicating electronically such as videoconferencing, access to internet and exchanging data or files between the computers. These resources can be printers, storage devices etc.
  • Some types of networks are Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Internetwork (internet).
7 0
3 years ago
A person whose body can still function properly without the drug but still craves the drug even though the high is not as intens
KIM [24]
Hello there!

You’re answer may be - Addicted.

Even though the persons body can function properly without the drug, they can still be considered addicted. Drug addictions tend to accur after long uses of drugs, which may be legal... or illegal.

I hope this helps you! Feel free to ask me for help anytime!

~Alexa
8 0
3 years ago
Programming exercise 3-4a
Rufina [12.5K]

Answer:

???????????.?????????????

6 0
3 years ago
Give a big-O estimate for the number of operations,
Kazeer [188]

Answer:

Explanation:

For the first iteration of i for loop 1 to n, the j for loop will run from 2 to n times. i.e. n-1 times.

For the second iteration of i for loop, the j for loop will run from 3 to n times. i.e. n-2 times.

From the third to the last iteration of i for loop, the j for loop will run n-1 to n times. i.e. 2 times.

From the second to the last iteration of i for loop, the j for loop will run from n to n times. i.e. 1 time.

For the last iteration of i for loop, the j for loop will run 0 times because i+1 >n.

Hence the equation looks like below:

1 + 2 + 3 + ...... + (n-2) + (n-1) = n(n-1)/2

So the number of total iterations is n(n-1)/2.

There are two operations per loop, i.e. Comparison and Multiplication, so the iteration is 2 * n(n-1)/2 = n ^2 - n

So f(n) = n ^ 2 - n

f(n) <= n ^ 2 for n > 1

Hence, The algorithm is O(n^2) with C = 1 and k = 1.

6 0
3 years ago
Other questions:
  • In steps<br> Urgent please
    14·1 answer
  • You were fortunate to get the ice off of the wings, but whatever caused the cabin to depressurize also vented all of your fuel o
    11·1 answer
  • Indicate the proper order (1-4) of the following PR strategic planning 4-step process. 1 Defining the problem 2 Evaluating the p
    10·1 answer
  • What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
    10·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that dea
    12·1 answer
  • Which of the following keywords is used to remove a row in a table? (Points : 2) DROP
    11·1 answer
  • The HTML tag for the smallest heading is​ what​
    13·1 answer
  • Why is dark supereffective against ghost?
    5·2 answers
  • Which statement is true of the digital sound produced by a computer using a<br> lower sample rate?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!