1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
2 years ago
9

Give five example of a dedicated device ​

Computers and Technology
2 answers:
sineoko [7]2 years ago
7 0

Answer:

inventory scanning, corporate-owned work profile devices

Explanation:

kogti [31]2 years ago
6 0

Common examples are ATMs, POS terminals, and airport ticket vending machines. Cashierless checkout technologies like “Scan and Go,” inventory scanning, corporate-owned work profile devices, self-ordering kiosks, mobile devices, and POS/m POS are some of the most common examples of dedicated devices in use today.

You might be interested in
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
jolli1 [7]

Answer:

Security blueprint

Explanation:

NIST 800-14 provides an understanding of the fundamental security requirements and security blueprints that most IT systems should include, serving as a reference for companies or organizations that desire to create and review their IT security programs.

The principles established a foundation for a concrete system security program and this practices directs organizations on the types of controls, objectives and processes that are involved in an effective and efficient IT security program.

7 0
4 years ago
What does the hexadecimal number 2D represent in the binary system?
Ber [7]
Every digit of a hex number is converted to 4 binary digits.
hex digits are { 0, 1, 2, .., A, B, .., F }.

2 in hex is equal to 0010 in binary.
D is equal to 1101.

so the answer is 00101101 or C.


8 0
3 years ago
By what date must federal taxes typically be filed and sent to the IRS?
marishachu [46]
April 15th of each annual year
6 0
4 years ago
R7.1 Carry out the following tasks with an array:
Andru [333]

Answer:

Following are the program in the C++ Programming Language.

//set header file or namespace

#include <iostream>

using namespace std;

//define main function

int main() {

//set integer type array with indexing 10

 int a[10];

//set integer type variable to 1

 int i=1;

//set element in 1st index

 a[0]=17;

//set element in last index

 a[9]=29;

//set while loop for the remaining elements

 while(i<9)

 {

//set -1 in the remaining elements

   a[i]=-1;

   i++;

 }

//set for loop to print array

 for ( int j = 0; j < 10; j++ ) {

   cout << a[j]<<endl;

 }

}

<u>Output:</u>

17

-1

-1

-1

-1

-1

-1

-1

-1

29

Explanation:

In the following program, we define the main function "main()" and inside it.

  • Set an integer type array element "a[]" with index value 10.
  • Set integer data type variable "i" initialize to 1.
  • Set elements in the first and last place in the array.
  • Set the while loop to initialize elements for the remaining place.
  • Set the for loop to print the array elements.
6 0
3 years ago
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
Other questions:
  • Presentation software allows business professionals to _____.
    14·2 answers
  • Spreadshet formula to add totals​
    12·1 answer
  • The atomic number of oxygen is 8. the atomic mass of oxygen is 16. him many neutrons does oxygen have
    12·1 answer
  • If I deal seven cards from a standard deck of 52, what is the chance that I will get two triples (three of a kind) and one other
    11·2 answers
  • If I make a Zoom Meeting, would you join it?
    7·2 answers
  • 30 POINTS!!
    15·2 answers
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • What is a GUI?
    11·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!