1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
8

an existing technology that would allow users to transfer images from the camera to the computer without connecting them

Computers and Technology
1 answer:
nalin [4]3 years ago
5 0

Answer:

wireless technology i guess??

You might be interested in
Which is a correct way to test whether two variables representing numbers, numOne and numTwo, are equal?
polet [3.4K]

Explanation:

Intital value of variable "NUM" is 10 when while loop execute for the first time , it check the condition ( num<10) and founds this FALSE. So the statement inside execute if while loop doesn't execute then it will not going to change the value of "NUM " . That is why the value of "NUM" will remain same i.e NUM 10

7 0
3 years ago
Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
galben [10]

Answer:

Ready-Running

Running-Ready

Running-Blocked

Blocked-Ready

Ready-Blocked

Blocked-Running

Explanation:

In monitor synchronisation, one of the scheduling approaches is the Mesa style scheduling.

The Mesa style scheduling in a Mesa monitor, the released thread due to a signal is also in the inactive state. Note that those inactive threads had the lock previously; but, they are unable to re-acquire it.

There are six ways it can carry out scheduling, they are as shown in the answer.

Please kindly check attachment for details and drawing.

8 0
3 years ago
The hardware that takes the input data and works with it
pogonyaev

Answer:

Examples of input devices include keyboards, mice, scanners, digital cameras and joysticks.

Explanation:

5 0
3 years ago
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Select the correct answer
adoni [48]
As a visually disabled person my self (if you want to check it out I have something called Aniridia) I love when websites have tabs easy to identify each category of the website. Additionally, when websites have clear bold titles and not to many words close together (it really do be putting strain on ones eye when that happens so having separated paragraphs is awesome if the website has words) but other than that it’s all I could think of from my POV. Hope this helps you :)
6 0
3 years ago
Read 2 more answers
Other questions:
  • Question 16 (2 points) Question 16 Unsaved
    11·1 answer
  • Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
    13·1 answer
  • Assume that an array named salarySteps whose elements are of type int and that has exactly five elements has already been declar
    11·1 answer
  • Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution m
    5·1 answer
  • 4) Which is a more efficient way to determine the optimal number of multiplications in a matrix-chain multiplication problem: en
    15·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • I want to make a game with a friend. I use visual studio code. How do I work on the game with him? Like can he edit the same tim
    10·1 answer
  • What are the determinants of price elasticity of demand?​
    11·2 answers
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
  • How bridges are built over water
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!