1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
2 years ago
7

An air purifier manufacturer is looking for ideas on using edge computing to enhance its products and services. Which approach w

ould make use of edge computing technologies?.
Computers and Technology
2 answers:
Mariana [72]2 years ago
5 0

We have that  an air purifier manufacturer can apply  edge computing technologies is inventory management.

<h3> Air purifier manufacturer and  edge computing</h3>

Question Parameters:

Generally,Edge computing is computing and storing resources at the data  production area.

Hence, An air purifier manufacturer can apply  edge computing technologies is inventory management as it will aid incoming and outgoing inventory assessment on production grounds.

For more information on Technology

brainly.com/question/25274620

ruslelena [56]2 years ago
4 0

The approach that would make use of edge computing technologies is; Inventory management.

<h3>What is Edge Computing Technology?</h3>

Edge computing is simply a de-centrally powered, fully accessible IT architecture that always enables mobile computer technology as well as internet technologies.

Now, an approach where the air purifier manufacturer can apply edge computing technologies is in inventory management due to the fact that it will assist in getting incoming and outgoing inventory assessment on their production grounds.

Read more about Technology at; brainly.com/question/25274620

You might be interested in
Elizabeth works for a local restaurant At the end of her shift, she is required
eimsori [14]

Answer:

write the time she arrived at the job and the time she left

Explanation:

6 0
4 years ago
Read 2 more answers
What defines "print media"? It is media that includes words and text rather than video, such as many blogs. It is media that is
uranmaximum [27]

Answer:

"It is media that is distributed in paper form, such as magazines and newspapers."

3 0
3 years ago
platforms, or any type of elevated surface, need to be clearly marked and the weight capacity for that particular surface should
Tpy6a [65]

Answer.

True

Explanation

According to Occupational Safety and Health Administration, aerial lifts should have load capacity ratings posted to indicate the amount of weight in a clearly marked sign. The signs posted will clearly show the elevated surface load capacity as an element of hazards management at worksites.


4 0
3 years ago
In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
Sergeu [11.5K]

Answer:

see explaination

Explanation:

Code below:

#include"letters.h"

int main()

{

while(1)

{

int input;

//Asks the user to enter 1 or 2 to see if the letter is a consonant

//of vowel.

printf("Enter 1 to check vowel or 2 for consonant:");

//scans inputted number

scanf("%i", &input);

//if the input is 1 then it will ask the user to enter the letter

//they want to test.

if(input == 1)

{

char c;

printf("Enter a character to test if it's a vowel:");

scanf(" %c",&c);

//if it is a vowel, then it will print that the letter is a vowel

if(is_vowel(c))

{

printf("%c is a vowel.\n", c);

}

//if not, then it will print that it isn't a vowel

else

{

printf("%c is not a vowel.\n", c);

}

}

//if the user inputs 2, then it will ask the user for the letter to test if

//it's a consonant or not.

else if(input == 2)

{

char c;

printf("Enter a character to test if it's a consonant:");

scanf(" %c",&c);

//if it is a consonant, then it will print that the letter is a consonant

if(is_h_consonant(c))

{

printf("%c is a consonant.\n", c);

}

//if not, then it will tell the user that it isn't a consonant

else{

printf("%c is not a consonant.\n", c);

}

}

else{

break;

}

}

return 0;

}

See attachment for sample output

4 0
3 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Other questions:
  • You can clear a log file simply by redirecting nothing into it. true or false?
    13·1 answer
  • Need answer Quick!!!!!
    10·1 answer
  • A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a tec
    13·1 answer
  • What solicits online input such as product ratings from consumers?
    7·1 answer
  • Pleaseeeeeeee tellllllllllllllllllllll​
    8·1 answer
  • Describe how to add slide numbers and image to a Microsoft power point presentations ?​
    5·1 answer
  • You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home usi
    9·1 answer
  • Join the class <br> The class code is hello112
    5·2 answers
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
  • What data type is this statement defined as in Python?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!