Which factor distinguishes IOT devices from standard computing devices such as laptops and smart phones?

Answers

Answer 1

Answer:

PLS help me I'm tried

Haa plsssssss


Related Questions

my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )


input_year = int(input())

if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")

elif input_year % 100 == 0:
print(input_year, "- leap year")

elif input_year % 400 ==0:
print(input_year, "is a leap year")

else:
print(input_year, "- not a leap year")

Answers

Answer:

Explanation:

The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75

input_year = int(input())

if input_year % 4 == 0:

   if input_year % 100 == 0:

       if input_year % 400 == 0:

           print(input_year, "is a leap year")

       else:

           print(input_year, "- not a leap year")

   else:

       print(input_year, "is a leap year")

else:

   print(input_year, "- not a leap year")

Suppose Alice downloads a buggy browser that implements TLS incorrectly. The TLS specification says that, during the handshake, the browser should send a random 256-bit number RB. Instead of picking RB randomly the browser always sends all zeros. Describe an attack that is possible against this buggy browser and how to update the browser so that this attack is no longer feasible.

Answers

Solution :

It is given that Alice downloads the buggy browser which implements a TLS incorrectly. The specification of a TLS states that during a handshake, the browser sends a 256 bit number of RB randomly.

So in this case, a man-n-the-middle attack is possible. It can compromise the confidentiality of Alice. Updating the browser by visiting the website and checking its latest version of the browser or installing some other browser which has a more trust in the market for its security features.

Write a template that accepts an argument and returns its absolute value. The absolute entered by the user, then return the total. The argument sent into the function should be the number of values the function is to read. Test the template in a simple driver program that sends values of various types as arguments and displays the results.

Answers

Answer:

In python:

The template/function is as follows:

def absval(value):

   return abs(value)

Explanation:

This defines the function

def absval(value):

This returns the absolute value of the argument using the abs() function

   return abs(value)

To call the function from main, you may use:

print(absval(-4))

When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off. secondary storage the central processing unit (CPU) software primary memory

Answers

Answer:

it could either be the R.A.M or the hard drive

Explanation:

Answer:

Secondary Storage

Explanation:

Secondary storage is permanent, therefore, it fits the context of what the question is asking for.

Programming a computer to win at chess
has been discussed since the
A. 1940's
B. 1950's
C. 1960's

Answers

I believe it was the 1960s but u should seach it up to double check

Answer:

B.

Explanation:

Three reasons Why we connect speakers to computers

Answers

1. Some computers do not have speaker therefore we connect speakers

2. Some speakers don’t have clear audio so to fix that we connect new ones

3. What do you do if your speaker inside the computer is broken..... connect new speakers

Answer:

we connected speakers with computers for listening voices or sound .. because the computer has not their own speaker..

Explanation:

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.


Open Office software is an example of what software

Answers

Answer:

Application software

Explanation:

OpenOffice.org (OOo), commonly known as OpenOffice, is a discontinued open-source office suite. ... OpenOffice included a word processor (Writer), a spreadsheet (Calc), a presentation application (Impress), a drawing application (Draw), a formula editor (Math), and a database management application (Base).

What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?


Pixel


Lens


Focus


Shutter

Answers

dnt listen to the link stuff

how does such editing affect courtrooms where visual evidence is often presented?​

Answers

Can hurt others..!! yw

Which step should you follow to copy a worksheet after clicking Format in the Cells group?
O Under Arrange Sheets, click Cut or Copy Sheet.
O Under Organize Sheets, click Move or Copy Sheet.
O Under Arrange Sheets, click Select and Move Sheet.
O Under Organize Sheets, click Arrange and Copy Sheet.

Answers

Answer:

Under Organize Sheets, click Move or Copy Sheet should you follow to copy a worksheet after clicking Format in the Cells group.

Explanation:

find four
reasons
Why must shutdown the system following the normal sequence

Answers

If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.

"init 0" command completely shuts down the system in an order manner

init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.

İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0

shuts down the system before safely turning power off.

stops system services and daemons.

terminates all running processes.

Unmounts all file systems.

Learn more about  server on:

https://brainly.com/question/29888289

#SPJ1

A new office need 16 computer Tables.If a computer tables costs 2,671.How much is needed to purchase 16 computer tables.​

Answers

Answer:

The total amount needed to purchase the 16 computer tables is 42,736

Explanation:

Given;

Total number of computer tables needed in the new office, n = 16

cost of one computer table, c = 2,671

The total amount needed to purchase the 16 computer tables is calculated as follows;

Total cost of 16 computer tables = cost of one computer table x total number of tables needed

Total cost of 16 computer tables = 2,671 x 16

Total cost of 16 computer tables = 42,736

Therefore, the total amount needed to purchase the 16 computer tables is 42,736

12. But not parallelism, it is achievable to have concurrency in operating system threading?

Answers

Answer:

Yes, it is possible to have concurrency but not parallelism. Concurrency: Concurrency means where two different tasks or threads start working together in an overlapped time period, however, it does not mean they run at same instant.

This unit is used to print the picture on a paper

Answers

Answer:a printer

Explanation:

It prints things

Number the steps to describe how Tristan can complete
this task.
Cut the Television and related equipment row.
Paste the Television and related equipment row.
Click the plus sign on the left side of the table between
the last two rows.

Answers

Answer:

Cut the Television and related equipment row.Click the plus sign on the left side of the table between  the last two rows.Paste the Television and related equipment row.

Explanation:

In order to move the row, Tristan should first select the row and then cut it. This will ensure that the row will be moved completely instead of copied.

Tristan should then hover with the mouse between the last two rows and click on the plus sign on the left side. It will add a new row to the sheet. between the last two rows.

Tristan should then select the topmost cell and click paste. The television row will be pasted there and Tristan would have successfully moved it.

Answer:

2 3 1 Your Welcome

Explanation:

6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1

Answers

Answer:

the output in the cell will be 0,2500

discuss file Management
With relevant examples.
in a Computer?​

Answers

Answer:

File management is the process of administering a system that correctly handles digital data. Therefore, an effective file management system improves the overall function of a business workflow. It also organizes important data and provides a searchable database for quick retrieval

briefly explain 5 software which is either free or fee​

Answers

Answer:

65

Explanation:

Answer:

65

Explanation:

Explain the term software dependability. Give at least two real-world examples which further elaborates
on this term. Do you think that we can ignore software from our lives and remain excel in the modern
era? What is the role of software in the current pandemic period?

Answers

Answer:

Explanation:In software engineering, dependability is the ability to provide services that can defensibly be trusted within a time-period. This may also encompass mechanisms designed to increase and maintain the dependability of a system or software.Computer software is typically classified into two major types of programs: system software and application software.

A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?

Answers

Answer:

The correct approach is "Shrink partition". A further explanation is given below.

Explanation:

Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.

Thus the above is the correct answer.

how do i remove my search history?

Answers

Step 1: Go to PC settings from the Start Menu or Desktop. Step 2: In PC settings, choose Search in the menu, and click Delete history.

wassup anybody tryna play 2k

Answers

Answer:

u dont want the smoke my boy u dont

Explanation:

Answer:

I only play 24k B)))))))))

Explain what an IM is,

Answers

Answer: Stands for "Instant Message." Instant messaging, or "IMing," as frequent users call it, has become a popular way to communicate over the Internet

Explanation:

State the causes of the increase in carbondioxide
concerntration​

Answers

Answer:

The right response is "fossil fuels".

Explanation:

Fossil fuels such as coal as well as oil conduct electricity that has already been photosynthesized by vegetation or plant species from the ecosystem for thousands of generations.Within only several hundred years we've returned fuel to that same ecosystem or environment, the sources of CO₂ rise are fossil fuels.

However, the above solution is the right one.

Joseph wants to take out the color of the background wall from an image what can Joseph do to achieve this​

Answers

Answer:

Go to remove a background website

Explanation:

He can download an application IbisPaint X, use the magic wand tool and select the background and then press the outlined square and select the option clear layer

Please rewrite and correct the following sentences:
1. Their dog ran away last night, and now their looking for him.
2. The company lost there biggest client last year.
3. Who is you going to the party with tonight?
4. The museums is open on Saturdays from 10am to 5pm.
5. Neither the boys or their father have any idea where the car keys is.

Answers

1.Their dog ran away last night, and now they are looking for him.

2. Their company lost their biggest client last year.

3. With whom you are going to the party with tonight?

4. The museums are open on saturdays from 10 am to  pm.

5. Fathers or Boys no one knows where the car keys are?

Thus, English has three tenses: past, present, and future. When writing about the past, we employ the past tense.

When writing about facts, opinions, or regular occurrences, we employ the present tense. To write about upcoming events, we utilize the future tense. Each of those tenses has additional characteristics, but we won't cover them in this session.

It's crucial to maintain the same tense throughout a writing endeavor after you've decided on one. To communicate yourself clearly, you may need to switch up the tense from time to time.

Thus, English has three tenses: past, present, and future. When writing about the past, we employ the past tense.

Learn more about Tenses, refer to the link:
https://brainly.com/question/29757932

#SPJ1

What are the vertical areas of the spreadsheet?

a
Verticies
b
Ventricals
c
Columns
d
Rows

Answers

Answer:

Columns

Explanation:

A spreadsheet may a explained as a tabular arrangement or arrays of cells which allows users to enter both numeric and string data for storage, manipulation and analysis. The spreadsheet program has both the vertical and horizontal cell arrangement with the vertical areas being reffered to as THE COLUMN which are labeled using alphabets arranged from A - AZ, AA - AZ, and so on to make up a total of 16384 columns on the Microsoft Excel spreadsheet program. Cells are located using a combination of column and row address. With row representing the horizontal area of the spreadsheet and labeled with digits. Therefore cells are usually refereed to as A1, (column A row 1) and so on.

While all pages use HTML code, not all pages are written in

Answers

Is this a question?

*Answer: not much information to answer with*

Answer:

Code Form

Explanation:

Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You may assume that all elements of the list are numeric (int or float), and that the list has at least one element. Hints: Use the function SumList that you wrote above. Use the built-in function len to get the number of elements in the list.

Answers

Answer:

Answered below

Explanation:

//Programmed in Java

public double avgList(int [] nums){

int I;

double sumOfNumbers = 0;

double averageOfNumbers = 0;

//Loop over to sum all elements in the list.

for(I = 0; I < nums.length; I++){

sumOfNumbers += nums[I];

}

//Calculate the average

averageOfNumbers = sumOfNumbers/ nums.length;

return averageOfNumbers;

}

Other Questions
Whose bedroom is this. Whoch detail from the passage indicates that the narrator realizes her father has a kindly motive for his collecting X rays with a wavelength of 0.085nm diffract from a crystal in which the spacing between atomic planes is 0.213 nm .Part AHow many diffraction orders are observed?ANSWER:N = studies have clearly shown that the interaction of ______________ and _____________ is the most consistent predictor of criminality. 1) Outline the purpose and distinct focus of management and business research.2) Apply the common problems encountered in the business research.3) Generate and refine research ideas to choose suitable research topics Find The distance between the pair of points G(0, - 5) and H(0, - 10 irina is told to use a meter stick to find the length of a room. she makes six independent measurements: 4.402 m, 4.217 m, 4.345 m, 4.925 m, 4.372 m, 4.289 m. how should she report the best estimate of the length of the room? 01 Answer the following question using your Unit 6 Student Resource Book. (page 447)Why are the Crawfish Wars important to the economic survival of Louisianas seafood industry?Success CriteriaWrite an introductory sentence restating the question. (1 sentence)Describe the Crawfish Wars. (1 sentence)Explain both sides of the war in complete sentences. 2 sentences) Explain your opinion on which side of the war works better. (1 sentence)Concluding sentence summarizing what you explained. (1 sentence)Must be 6 sentences.Do not reference anything outside of your reading. Luca read about droughts, in which the rainfall is significantly lower than average. He has noticed that it has not rained much in his area this month. How could he collect data to find out if his area is experiencing a drought? A. He could compare the rainfall to other cities.B. He could measure the standing water on the ground.C. He could measure the rainfall every day for a month and compare those measurements to the average rainfall for that month.D. He could measure the temperature each day for a month and compare those measurements to the average temperature for that month. What is the prepositional phrase in the sentence below?After the football game, the players went home but could not fall asleep because they were still so excited about the victory. A. but could not B. after the football game C. because they were still D. players went home Una princesa encantadora de un pas lejano visita el castillo y decide comprar el vestuario.What adjective is used to describe the princess? Beautiful Charming Distant Happy which tasks are typically conducted by managers in the goal and plan evaluation step of the formal planning process? (choose every correct answer.) multiple select question. create a schedule for plan implementation. estimate the costs of each plan. select the best goal and plan. prioritize and, if necessary, eliminate goals. evaluate advantages of each goal and plan. Identify the incorrect word: Emma told Jim that his car is still in its parking place next to our apartment. A. his B. its C. our D. no error calculate the difference in slope of the chemical potential against temperature on either side of the normal freezing point of water and the normal boiling point of water the molar entropy change accompanying fussion is 22.0 and that accompanying evaporation What happened to the Roman Empire? please help ! Which of the following details from the text best supports the answer to question 30?Question 31 options:"Birmingham is probably the most thoroughly segregated city in the United States.""Sometimes a law is just on its face and unjust in its application. For instance, I have been arrested on a charge of parading without a permit."One day the South will know that when these disinherited children of God sat down at lunch counters, they were in reality standing up for what is best in the American dream""Let me take note of my other major disappointment. I have been so greatly disappointed with the white church and its leadership. Of course, there are some notable exceptions. I am not unmindful of the fact that each of you has taken some significant stands on this issue." Which type of government is run by people who have been elected?A. ConfederationB. RepresentativeC. ReservedD. Monarchy Using the below code, do the following:int main (int argc, char** argv) {printf ("# of arguments passed: %d\n", argc) ;for (int i=0; i< argc ; i++) { printf ( "argv[%d] = %s\n", i, argv[i] ) ;} return (0) ;}1) convert any argument that is actually a number, from its string form into an integer using sscanf(). As a small hint, look at the return type of sscanf(), notice that if it makes a match, you get the # of matches it made to your string as a return.2) store any integer arguments into an array of integers (you may assume well never pass in 10 integers at any time). For the above example (./program3 arg1 2 arg3 4 arg5), your program would generate an array: {2, 4}3) store any non-integer argument (example: arg1) into 1 large string separated by spaces, using sprint(). For the above example, your program would generate a string: "program3 arg1 arg3". You may assume a maximum length of 250 for this string.4) print out the contents of your integer array (a newline after each element) and the contents of your single string. Which of the options below are correct descriptions of hard stabilization of beaches? Select all that apply. Which of the options below are correct descriptions of hard stabilization of beaches? Select all that apply. Groins, which are built in pairs at river entrances, aim to keep sand from depositing in the channel. Groins unfortunately cause longshore currents to erode sand from the beach on their downcurrent sides. Jetties, which are built in pairs at river entrances, aim to keep sand from depositing in the channel. An effect of jetties is the erosion of sand on their downcurrent sides and the deposition of sand on their upcurrent sides. Seawalls are built to reflect the forces of unspent waves on the seaward side. Unfortunately, seawalls cause erosion of the beach on the landward side. Groins, which are built to maintain or widen beaches, are barriers built at a right angle to the beach. Groins unfortunately cause longshore currents to erode sand from the beach on their downcurrent sides. Seawalls are built to reflect the forces of unspent waves on the seaward side. Unfortunately, seawalls cause erosion of the beach on the seaward side. If $2500 is invested at an interest rate of 5.5% per year, compounded continuously, find the value of the investment after the given number of years. (Round your answers to the nearest cent.) (a) 3 years $ 2948.48 (b) 6 years $ (c) 18 years $ GIVING BRAINLIEST!!!!!!The Sahara is the world's biggest hot desert. The Sahara stretches across the northern part of Africa.Which revision uses an appositive to combine these two sentences correctly?A) The Sahara is the world's biggest hot desert because it stretches across northern Africa.B) The Sahara stretches across the northern part of Africa and is the biggest hot desert.C) The Sahara stretches across the northern part of Africa, making it the largest hot desert.D) The Sahara, the world's biggest hot desert, stretches across the northern part of Africa.