It is called the internet of things because? a. objects have built-in intelligence b. sensors connect objects to the internet c. connecting the objects is a user option

Answers

Answer 1

It is called the internet of things because option b. sensors connect objects to the internet.

Why is it called the internet of things?

It was called so based on its developer known to be called Ashton who was said to be working in supply chain optimization and since he wanted to get   senior management's attention to the new tech, he was said to have called his presentation “Internet of Things”.

Note that Internet of Medical Things (IoMT) Sensors helps in the the collection of data  and also the sensors links  objects to the internet.

Therefore, It is called the internet of things because option b. sensors connect objects to the internet.

Learn more about internet of things from

https://brainly.com/question/14087456

#SPJ1


Related Questions

The formation of fossil fuels is a process that takes millons of years and starts from enrgy from the sun the sun contrubetes to the formation of fossil fuels by ?

Answers

The creation of fossil fuels is a long-term process that begins with solar energy. The sun contributes to the formation of fossil fuels by providing energy to the living things that eventually turn into fossil fuels.

Decomposing vegetation and animals make up fossil fuels. The Earth's crust contains these fuels, which can be burned to provide energy. Coal, oil, and natural gas are examples of fossil fuels. In sedimentary rock formations, which are accumulations of rock, dead plant and animal materials, and layers of sediment, coal is a substance that is frequently discovered. More than 50% of a coal's composition must be fossilized plant material.

Learn more about fossil fuel https://brainly.com/question/2029072

#SPJ4

cable operators and technicians hold onto their edge over digital subscriber line (dsl) and telco services with

Answers

Cable operators and technicians hold onto their edge over digital subscriber line (dsl) and telco services with professional installations and customer follow-up as DSL installations are performed by the customer.

Any individual or group that offers cable service over a cable system and directly or indirectly, through one or more affiliates, owns a sizable portion of that cable system, or who otherwise controls or is in charge of, through any arrangement, the management and operation of such a cable, is referred to as a cable operator.

Using its HFC network in Karachi and Lahore, Worldcall (Pvt) Ltd is the leading provider of cable modem broadband in Pakistan. Another HFC service provider in the nation is Wateen Telecom.

They were also subject to fees from the networks. Thus, the cable networks primarily make money from two sources: subscription fees they collect and advertising, which includes promoting and publicising goods like clothing, jewellery, etc.

Learn more about cable:

https://brainly.com/question/22076572

#SPJ4

The transition from ipv4 to ipv6 requires that ____________. (check all that apply)

Answers

The transition from ipv4 to ipv6 requires that IPv4 routers still in use must "tunnel" IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams.

The network layer protocol known as the Internet Protocol (IP) is used by the TCP/IP protocol suite to address and route data packets between hosts. The Internet Protocol is also known as the English Internet Protocol and is shortened as IP. -hosted on a computer network using TCP/IP.

IP version 4 (IPv4), which was described in RFC 791 and released in 1981, is now the most extensively used version of IP. However, IP version 6 will eventually take its place.

Learn more about internet protocol https://brainly.com/question/27581708

#SPJ4

Is our world better or
worse because of
digital representation?

Answers

Answer:

is better cuz with digital representation u get to learn more when u use them

What would happen if a program tried to access a variable that was defined locally in another part of the program?.

Answers

The thing that would  happen if a program tried to access a variable that was defined locally in another part of the program is that said project would fail or will not succeed.

What are variables and how are they important for a program?

Variables are known to be tools that are used to save information that will be referenced as well as be altered in a computer program.

Note that they also give a method that one can make use of in labeling data with a form of descriptive name, so our programs can be known well and more clearly by the reader.

Therefore, The thing that would  happen if a program tried to access a variable that was defined locally in another part of the program is that said project would fail or will not succeed

Learn more about computer variable from

https://brainly.com/question/27975087

#SPJ1

Which objective data is most helpful to monitor in the debilitated client with terminal liver cancer?

Answers

The objective data is most helpful to monitor in the debilitated client with terminal liver cancer is Present weight.

Can terminal liver cancer cured?

The liver cancer is known to be one that tends to affect the liver and this type is said to be one that is at the end or critical stage.

Note that it is seen as  a kind of cancer that may not be possible to cure and here the patient will be losing a lot of weight.

Therefore, The objective data is most helpful to monitor in the debilitated client with terminal liver cancer is Present weight.

Learn more about terminal liver cancer from

https://brainly.com/question/10071925
#SPJ1

A service that lets you store data in a remote location over the internet is called.

Answers

A service that lets you store data in a remote location over the internet is called cloud storage

Cloud storage refers to the provision of various services via the Internet. Software, networking, databases, servers, and data storage are examples of these resources.

Instead of storing files on a local device or hard drive device, cloud-based storage allows them to be saved to a remote location.  So  long as an electronic device has internet access, it has access to data and the software programs needed to run it.

Cloud storage is becoming increasingly popular among individuals and businesses for a variety of reasons, including security, cost savings, increased efficiency, speed and productivity.

To learn more on cloud storage: brainly.com/question/17371158

#SPJ4

feature of super computer short​

Answers

Answer:

Characteristics of Supercomputer

They can support more than a hundred users at a time.

These machines are capable of handling the massive number of calculations that are beyond the human capabilities, i.e., the human is unable to solve such extensive calculations.

Many individuals can access supercomputers at the same time.

These are the most expensive computers that can ever be made.

Answer:b

Explanation:

you're installing network wiring for a new ethernet network at your company's main office building. the project specifications call for cat 5e utp network cabling and rj45 wall jacks. near the end of the project, you run out of wire before the last few runs are complete. you have a spool of cat 3 network cable in storage. upon closer inspection, it appears very similar to the cat 5e wiring. to finish the project, should you use the cat 3 cabling as a substitute for the cat 5e cabling? no. cat 5e cabling has more twists per inch than cat 3 cabling, reducing crosstalk and supporting higher data rates. no. the sheath surrounding cat 5e cabling is much thicker than the cat 3 sheath, creating an extra layer of shielding that reduces crosstalk and supports higher data rates. yes. you can use cat 3 cabling as a substitute for cat 5e cabling since they're electrically identical. no. cat 5e cabling uses a thicker copper wire than cat 3 cabling, enabling higher data transmission rates.

Answers

In order to finish this project, I would say: A. No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates.

What is a cable?

A cable can be defined as a type of wired connector which are either made of glass or copper and used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.

The types of twisted-pair cables.

In Computer networking, there are different types of twisted-pair cables and these include the following:

Cat 3Cat 5eCat 6 (Class E)Cat 6a (Class EA)Cat 7 (Class F)

In order to finish this project, I would say that the Cat 3 cabling shouldn't be used as a substitute for the cat 5e cabling because Cat 5e cabling has more twists per inch.

Read more on Cat 5e cables here: https://brainly.com/question/28402675

#SPJ1

you have received a text encoded with morse code and want to decode it. input: your program should read lines from standard input. each line contains a morse code message. each letter in the code is separated by a space char, each word is separated by 2 space chars. the output will contain encoded letters and numbers only. output: print out the decoded words.

Answers

The program that decodes the code that comes in morse code is given below:

The Code

package com.codeeval.easy;

import java.io.BufferedReader;

import java.io.File;

import java.io.FileReader;

import java.io.IOException;

import java.util.HashMap;

import java.util.Map;

public class MorseCode {

*The complete code is attached as a file

Read more about programming here:

https://brainly.com/question/23275071
#SPJ1

you are assembling components in a network rack and need a device that connects three network segments. which of the following devices will meet your networking needs?

Answers

Answer:Ethernet router

Explanation: An Ethernet router is a device that connects two or more network segments or subnets. This would meet your networking needs.

Which statement best describes the type of computer found in everyday
appliances?
A. They can be programmed with many applications to perform
varied functions.
B. They are interchangeable with desktop computers, smartphones,
or tablet computers.
C. They are housed in their own cases and paired with monitors,
keyboards, and mice.
D. They can manipulate information and are able to store, retrieve,
and process it.

Answers

A statement which best describes the type of computer found in everyday appliances is that: D. They can manipulate information and are able to store, retrieve, and process it.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

Generally, a computer is a type of sophisticated electronic device that can be to store, retrieve, and process data into an output (information) that is meaningful and useful.

In conclusion, we can reasonably infer and logically deduce that a statement which best describes the type of computer found in everyday appliances is that they can manipulate information and are able to store, retrieve, and process it.

Read more on computers here: brainly.com/question/14614871

#SPJ1

Answer:

They can manipulate information and are able to store, retrieve, and process it.

1.3.2

Explanation:

Which of the following stores data using microscopic light and dark spots?
Flash drive
Compact disc
RAM
Hard disk

Answers

The technology that stores data using microscopic light and dark spots is: B. Compact disc.

What is a compact disc?

A compact disc is also referred to as an optical disc (OD) and it can be defined as a small, circular and digital-disc which is designed and developed to be used for the storage of computer data, especially by using a laser beam (microscopic light) and dark spots technology.

Generally, a compact disc (CD) is able to store digital data because it is manufactured through the use of polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.

In this context, we can reasonably infer and logically deduce that data is typically stored on compact discs (optical discs) by using a laser beam (microscopic light) to either melt the disc material or change the color of embedded dye.

Read more on optical disc here: brainly.com/question/28066311

#SPJ1

The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.

Fill in the blank

Answers

The number 72 dpi is the standard dots per inch used for blogs, social media, webpages, and emails.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

For any print project, the preferred resolution is typically 300 dpi, while the optimum resolution for social media, blogs, webpages, and emails is typically 72 dpi.

Note: dpi is an abbreviation for dots per inch.

Read more on resolution here: brainly.com/question/28182244

#SPJ1

a home file should be used for: a. records that are difficult to replace. b. financial records for current needs. c. storing all financial documents and records. d. obsolete financial documents. e. documents that require maximum security.

Answers

A home file should be used for option b. financial records for current needs.

What is a home file?

A house file is known to be a composition of people who are known to have at least a single common interest.

In regards to business, financial records  are known to be documents that show a person where a company's money originates from, where it went, and where it is been used for as at now.

Therefore, A home file should be used for option b. financial records for current needs.

Learn more about home file from

https://brainly.com/question/12982211

#SPJ1

A home file should be used to keep:

A) Records that are difficult to replace.

B) Documents that require maximum security.

C) Financial records for current needs.

D) Obsolete financial documents.

E) All financial documents and records.

Because rdram could be used only with intel components, amd and many major system and memory makers threw their support behind an alternative to rdram called?

Answers

Because rdram could be used only with intel components, amd and many major system and memory makers threw their support behind an alternative to rdram called doubling data rate SDRAM (DDR SDRAM).

The memory subsystem known as Rambus Dynamic Random Access Memory (RDRAM) is made to transfer data more quickly. RDAM consists of a bus path that connects RAM to microprocessors and other PC components, a RAM controller, and random access memory (RAM).

Because Intel was so confident in it, the 850 chipset-based Pentium 4's initial platform only supported RDRAM. What went wrong, then? High latency, greater heat, and a more expensive price tag were a few problems that the technology was unable to solve.

Rambus created many synchronous dynamic random-access memory (SDRAM) varieties from the 1990s to the early 2000s, including Rambus DRAM (RDRAM), Concurrent Rambus DRAM (CRDRAM), and Direct Rambus DRAM (DRDRAM).

Learn more about rdram:

https://brainly.com/question/13748829

#SPJ4

String instruments excel at performing smoothly, connected notes, which is called? a. legato. b. tremelo. c. pizzicato. d. staccato.

Answers

String instruments excel at performing smoothly, connected notes, which is called option a. legato.

What is a legato?

Legato is known to be a kind of a musical performance method that is known to make or create  fluid, continuous motion that often exit between notes.

Note that all of the individual note is said to be played to its highest duration and then it often mix up directly into any of the note that follows.

Therefore, based on the above, String instruments excel at performing smoothly, connected notes, which is called option a. legato.

Learn more about String instruments from

https://brainly.com/question/26557019

#SPJ1

A computer that is part of the workgroup can exist on the same network but is not authorized to access the domain resources. True or false?.

Answers

Answer:

True.

Explanation:

A new programmer often uses the vi editor to create scripts and often has a need to view lines as numbered in the vi editor. What advice do you provide?

Answers

Answer: Press ‘ESC’ and then ‘:’ and type ‘set number’

-> :set number

Explanation:
ESC being you into command mode and the colon specifies the command and you want to “set” line “number” so you type :set number. To remove line numbers, simply do the same thing but type nonumber instead of number.

Cheers.

The ___of a process contains temporary data such s functon parameters, return addresses, and local variables.

Answers

The stack of a process contains temporary data such as function parameters, return addresses, and local variables.

Stack is the tool that uses the phenomena of Last In First Out(LIFO) to temporarily store the data for the time being. The stack pointer specifies the last inserted data so that it can be removed first when new data is being entered. The size of the stack is generally changeable.

There are two types of stacks called register stacks and memory stacks. The register stacks can only be used to store limited data while memory stacks have the ability to store a vast amount of data and local variables.

The stack process usually involves two steps, the first is known as push in which the temporary data is allocated at the position directed by the stack pointer depending on the size of the data, The second step is pull in which the last entered data is removed from the allotted location.

To learn more about stack, click here:

https://brainly.com/question/13152669

#SPJ4

A named constant is like a variable, but it its content cannot be changed while the program is running. true false

Answers

A named constant is like a variable, but it its content cannot be changed while the program is running is a true statement.

What is a constant in programming?

Data values are known to be component that often stay the same at all time if a  program is to be executed and they are known to be called constants.

Note that Constants are not expected to be altered. Literal constants are seen as real values that are known to be fixed into the source code.

Therefore, A named constant is like a variable, but it its content cannot be changed while the program is running is a true statement.

Learn more about named constant from

https://brainly.com/question/13034246

#SPJ1

dion training is hiring a penetration testing firm to conduct an assessment of its corporate network. as part of the contract, the company has specified that it will not provide any network details to the penetration testing firm. instead, the company wants to see how much information about the network can be found by the penetration testers using open-source research and scanning the corporate network. what type of assessment is this considered? unknown environment testing partially known environment testing known environment testing semi-trusted environment testing see all questions back next question

Answers

The type of assessment that is known to be considered in the above scenario is known environment testing.

What is environment testing?

Environmental testing is known to be a kind of the measurement in regards to the performance of equipment when it is found to be under a given or specified environmental conditions

Note that in regards to the Environmental testing, the environmental conditions can be: extremely high as well as low temperatures. large, swift variations in temperature and others.

Therefore, The type of assessment that is known to be considered in the above scenario is known environment testing.

Learn more about environment testing from

https://brainly.com/question/21902774
#SPJ1

you are given an array of strings arr. your task is to construct a string from the words in arr, starting with the 0th character from each word (in the order they appear in arr), followed by the 1st character, then the 2nd character, etc. if one of the words doesn't have an ith character, skip that word. return the resulting string.

Answers

Answer:

const solution = (arr) => {

   const queue = arr

   let res = "";

   // keep looping untill the queue is empty

 while(queue.length>0){

   // taking the first word to enter the queue

   const cur = queue.shift()

  // get and add the first letter of that word

   res+= cur.substring(0, 1);

   // add the word to the queue if it exists

   if(cur!== "") queue.push(cur.slice(1))

 }

 return res ;

}

console.log(solution(["Daily", "Newsletter", "Hotdog", "Premium"]));  

// DNHPaeoriwtelsdmyloiegutmter

console.log(solution(["G", "O", "O", "D", "L", "U", "C", "K"]));  

// GOODLUCK

Explanation:

Using queue data structure in Javascript

This is the very optimal solution to the question

1.1.1 Give two examples of situations where electronic circuits are used

Answers

Answer:

Such digital integrated circuits are ubiquitous in modern electronic devices, such as calculators, mobile phone handsets, and computers.

Explanation:

Which pathway includes implementing computer systems and software and database
management?

Answers

The Information Support and Services Pathway (technical) includes implementing computer systems and software and database management.

What is the Technical pathway about?

This is known to be the pathway where the Employees that can be seen in the Information Support as well as Services Pathway tends to implement computer systems as well as software, they provide some measures of assistance and handles  information systems

Therefore, The Information Support and Services Pathway (technical) includes implementing computer systems and software and database management.

Learn more about database management from

https://brainly.com/question/24027204
#SPJ1

What is the state of data that is sitting in ram ready to be read, updated, or processed?

Answers

Answer: Data stored in RAM is considered volatile and can be read from or written to (updated); however, it has no permanence. Can be considered data in transit.

Explanation:
Not really sure why your answers are limited here, but an argument can be made for all three; however, processed can be inclusive of both read and updated. I’ll expand a bit below.

RAM stands for Random Access Memory and it is used by your system to store information for a running application or process necessary to allow that process to run. This memory is read by that application and updated by that application to allow a quick access by the operating system for the processor when needed faster than reading from your HDD or SSD and then writing back to that long term storage. In this way, RAM allows the appearance of a faster system. RAM can be consider data in transit since it’s always being updated and read by the application or operating system.

you have just upgraded the memory in one of your network servers by adding two 4-gb ecc memory cards. before purchasing the new memory, you made sure that the modules fit in the memory slots (packaging) and the speed (memory frequency) was supported by the memory controller. what did you forget to check that would significantly impact the memory checking of your new ecc memory cards?

Answers

Answer:Whether or not the existing memory modules support

Explanation:

Mixing ECC and non-ECC memory would disable the error correction function on the new memory cards.

list the command to create a generation 2 virtual machine named svr-02 in the v:\vm folder that has 4gb of ram and uses the disk at v:\vhd\svr-02.vhdx

Answers

First, create the disk that will be used for the virtual machine. You can do this with the command:

VHDX create v:\vhd\svr-02.vhdx -SizeBytes 4GB

Second, create the virtual machine with the command:

New-VM -Name svr-02 -Generation 2 -Location v:\vm -MemoryStartupBytes 4GB -SnapshotFilePath v:\vm\svr-02.vhdx

That's it! You now have a generation 2 virtual machine named svr-02 in the v:\vm folder that has 4GB of ram and uses the disk at v:\vhd\svr-02.vhdx.

Learn more on virtual machine here:

https://brainly.com/question/27696457

#SPJ4

the idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by

Answers

The idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by Bill Atkinson of Apple Computer.

Who is Bill Atkinson?

Bill Atkinson is known to be a famous American computer engineer as well as a photographer.

Atkinson was known to be a man who had worked at Apple Computer from the year 1978 to 1990

Therefore, The idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by Bill Atkinson of Apple Computer.

Learn more about Apple Computer from

https://brainly.com/question/27255447

#SPJ1

A(n) _____, such as microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Answers

A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

What is a personal information manager PIM software?

A personal information manager (PIM) is known to be a kind of a software application that is known to function by the use of  tools to help one or computer users to be able to handle and monitor contacts, calendars, tasks, appointments as well as other forms of personal data.

Therefore, A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Learn more about ​personal information manager (PIM) from

https://brainly.com/question/23664875

#SPJ1

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

a. swim lane

b. ​personal information manager (PIM)

c. ​fact-finding application

d. ​enterprise architecture

Other Questions
The following table presents the time taken to review articles that were submitted for publication to a particular journal during a recent year. A few articles took longer than 6 months to review; these are omitted from the table. Consider the data to be a population. Here is the histogram of a data distribution.What is the shape of this distribution?O A. Unimodal skewed B. Bimodal symmetric C. Unimodal symmetric D. Bimodal skewedO E. Uniform 609+283+97 pls help help helpp Given a regular pentagon with radius 5, and each side of length 6, find the area of the pentagon. A) 120 square units B) 60 square units C) 45 square units D) 30 square units a group of people who shape their lives in aggregated and patterned ways that distinguish their group from others Which statement about the product is true? (1 point)5.643 x 4.6O The product is irrational.The product is neither rational nor irrational.O The nature of the product cannot be determined.O The product is rational. pam, your new marketing manager, is exploring the purchase of tens of thousands of email addresses from a legitimate source for the purpose of sending product information to the masses. she has asked your opinion. would you agree or disagree with her idea? why or why not? By the mid-eighteenth century (1750s), American colonial representative assemblies:A- existed only to exercise the policies of the English parliament.B- exercised a significant degree of authority to levy taxes.C- consisted of colonists all approved by the royal governors.D- felt little loyalty to the English government. Unique ways of pronouncing words or using grammar in idiosyncratic ways that only those we communicate with most understand are known as? Suppose that a person with damage to the hippocampus is unable to acquire new long-term memories. Why might the acquisition of short-term memories also be impaired? 248 miners need to ride the elevator to the bottom of the mine. The elevator can hold 9 miners at a time. How many miners will be in the elevator on its last trip? What relationship do you notice between how fast a planet moves in its orbit and its distance from the sun? in heliocentricism A cube containing two sodium atoms has a mass of 7.64 x 10-23 g and a density of 0.963g/cm3. calculate the length of a side of the cube in pm. Cam someone help plss A produce packing company prepares crates of apples to ship to supermarkets. Supposethat the weight of a randomly selected crate is known to be Normally distributed, witha mean of 14 kg and a standard deviation of 1.4 kg.(a) Find the weight of a particular crate such that the probability of randomly selecting a heavier crate is 0.05.(b) Find the probability that a randomly selected crate will weigh more than 16kg.(c) If 20 crates are randomly and independently selected, what is the probability thatat least 2 of them will weigh more than 16kg? For subjects in the short protocol, what was the mean ACTH level at waking? Using the data in the last two columns, calculate the mean level 30 minutes later. Was the rate of change faster or slower in that 30-minute period than during the interval from 1: 00 to 6:00 a.m.? Solve for x. Please show work.2x + 6 = -3x - 14A) 16 Miss Violet was in the cafeteria.B) -16 Mrs. Teal was in the library.C) 3.2 Mr. Brown was in the auditorium.D) -4 Ms. Ivory was in the student center.E) 4 Prof. Gray was in the library. Mifflin Company2Talk about what you like to do. Complete the following sentences with a word orexpression from the vocabulary.1. A ti qu ____ hacer 2. A m me gusta montar en3. Me gusta preparar la4. Los sbados me gustahacer?un DVD.3 Ask the following people if they like to do the activities in parentheses.modelo: Camila (dibujar): Camila, te gusta dibujar?1. Felipe (tocar la guitarra)2. Mayra (hablar por telfono) Glucose is broken down in most of your cells to form carbon dioxide, oxygen, and the energy currency of the cell called atp. what type of chemical reaction is this? simplify three square root of five end root minus two square root of seven end root plus square root of forty five end root minus square root of twenty eight. (1 point)