What component can you use to open windows?
-A servomotor
-An LED
-A buzzer
-An ambient light sensor

Answers

Answer 1

Answer:

A servomotor.

Explanation:

Because you can only open the window with the force given by the servo motor.I am not sure tho


Related Questions

Advancements in technology often make computer
hardware and software more convenient to use as
well as able to fit a variety of budgets. As
technology advances, it usually gets
smaller and less expensive.
larger and more expensive.

Answers

Answer: smaller and less expensive.

Explanation:

As technology advances, the architects of the devices that we use are getting more efficient in the production of said devices such that they are using better materials and techniques in production.

This has led to a situation where devices are increasingly getting smaller in size and cheaper to afford as well. For instance, compare the computers of today to those of the 90's. We have laptops now which are really slim and cost a fraction of what the bulky computers of those days cost.

Array unsortedArr contains an unsorted list of integers.
Array sortedArr contains a sorted list of integers.

Which of the following operations are NOT more efficient for sortedArr than unsortedArr? Assume the most efficient algorithms are used.

I. Searching for a given element
II. Finding the minimum
III. Inserting an element

a. Ill only
b. Il only
c. I only
d. I and II
e. I and III

Answers

Answer:

a. Ill only

Explanation:

This is because, for option III, in inserting an element, one only need the array key for the position in which to insert the element and this is irrespective of whether the array is sorted or not.

Whereas, options I and II are easier done in a sorted array than in an unsorted array.

A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunities defines:______.a. democratic planning.b. bottom-up planning.c. top-down planning.d. foundation planning.

Answers

Answer:

Option b (bottom-up planning ) is the correct approach.

Explanation:

This kind of planning gives clients additional emphasis to their program since a greater amount of individuals are participating, that every single person has its unique knowledge, which is termed as Bottom-up planning.it is always a positive thing promoting morality since it promotes the engagement of employees towards company strategy.

All other three alternatives aren't connected to the given query. So the above would be the correct solution.

what are different between system and application software?​

Answers

Answer:

System software is meant to manage the system resources. It serves as the platform to run application software. Application software helps perform a specific set of functions for which they have been designed. Application software is developed in a high-level language such as Java, C++, .

Explanation:

Hope it helps ^-^

#CarryOnLearning

Write an application that determines whether the first two files are located in the same folder as the third one. The program should prompt the user to provide 3 filepaths. If the files are in the same folder display All files are in the same folder, otherwise display Files are not in the same folder.

Answers

Answer:

The program in Python is as follows:

fname1 = input("Filepath 1: ").lower()

fname2 = input("Filepath 2: ").lower()

fname3 = input("Filepath 3: ").lower()

f1dir = ""; f2dir = ""; f3dir = ""

fnamesplit = fname1.split("/")

for i in range(len(fnamesplit)-1):

   f1dir+=fnamesplit[i]+"/"

fnamesplit = fname2.split("/")

for i in range(len(fnamesplit)-1):

   f2dir+=fnamesplit[i]+"/"

fnamesplit = fname3.split("/")

for i in range(len(fnamesplit)-1):

   f3dir+=fnamesplit[i]+"/"

if f1dir == f2dir == f3dir:

   print("Files are in the same folder")

else:

   print("Files are in the different folder")

Explanation:

The next three lines get the file path of the three files

fname1 = input("Filepath 1: ").lower()

fname2 = input("Filepath 2: ").lower()

fname3 = input("Filepath 3: ").lower()

This initializes the directory of the three files to an empty string

f1dir = ""; f2dir = ""; f3dir = ""

This splits file name 1 by "/"

fnamesplit = fname1.split("/")

This iteration gets the directory of file 1 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f1dir+=fnamesplit[i]+"/"

This splits file name 2 by "/"

fnamesplit = fname2.split("/")

This iteration gets the directory of file 2 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f2dir+=fnamesplit[i]+"/"

This splits file name 3 by "/"

fnamesplit = fname3.split("/")

This iteration gets the directory of file 3 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f3dir+=fnamesplit[i]+"/"

This checks if the file directories hold the same value

This is executed, if yes

if f1dir == f2dir == f3dir:

   print("Files are in the same folder")

This is executed, if otherwise

else:

   print("Files are in the different folder")

A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user. Plz give answer in C++.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int qty;

   float discount = 0;

   cout<<"Quantity: ";

   cin>>qty;

   int cost = qty * 100;

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

   cout<<"Cost: "<<cost - discount;

   return 0;

}

Explanation:

This declares the quantity as integer

   int qty;

This declares and initializes discount to 0

   float discount = 0;

This prompts the user for quantity

   cout<<"Quantity: ";

This gets input for quantity

   cin>>qty;

This calculates the cost

   int cost = qty * 100;

If cost is above 1000, a discount of 10% is calculated

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

This prints the cost

   cout<<"Cost: "<<cost - discount;

Identify congruent triangles. Justify why these triangles are congruent?

1. Hanger
2. Watermelon
3. Triangle Ruler
4. Pizza
5. Triangle Roof house​

Answers

4 because it’s a triangular ruler

Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language

Answers

Answer:

Explanation:

The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.

import random

def addDigits(num):

   sum = 0

   for x in str(num):

       sum += int(x)

   return sum

sum = addDigits(random.randint(222, 1000))

while True:

   myRandomNum = random.randint(2, 99)

   if (sum % myRandomNum) == 0:

       print("No remainder between: " + str(sum) + " and " + str(myRandomNum))

       break

Write an algorithm to sum to values

Answers

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

What is blockchain in detail?

Answers

Question

What is blockchain?

Answer

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems.

❄❄❄❄❄❄❄

hope this helps you !!

enjoy your day

◕ ◡ ◕

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Group of answer choices

Answers

The term [tex]\sf\purple{digital \:convergence}[/tex] refers to the use of a single unifying device that handles media, internet, entertainment, and phone needs.

[tex]\large\mathfrak{{\pmb{\underline{\red{Happy\:learning }}{\orange{.}}}}}[/tex]

write a program to input a character (ch)convert the character into its opposite case. print the entered character in the new character the program should reject if the elector entered is not an alphabet A to z or a to z your program should continue as long as the user wants.
[tex]write \: in \: java [/tex]

Answers

Answer:

import java.util.Scanner;  

import java.lang.*;

class Main {

 public static void main(String[] args) {

   boolean exit = false;

   Scanner reader = new Scanner(System.in);

   while(!exit) {

     char c = '?';

     while( !Character.isLetter(c)) {

       System.out.print("Enter a letter or * to exit: ");

       c = reader.next().charAt(0);

       if (c == '*') {

         exit = true;

         break;

       }

       if (!Character.isLetter(c)) {

         System.out.printf("Error: %c is not a letter!\n", c);

       }

     }

     if (Character.isLowerCase(c)) {

       System.out.printf("%c in uppercase is %c\n", c, Character.toUpperCase(c));

     } else if (Character.isUpperCase(c)) {

       System.out.printf("%c in lowercase is %c\n", c, Character.toLowerCase(c));

     }

   }

   reader.close();

 }

}

Explanation:

I decided to use the asterisk (*) as exit character.

a) Which two technologies you would suggest to making tolling process fast?

Answers

Phone and computer yea yea lil baby

Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions?

1. MOV CX, [BX+DI]
2. MOV AX, ARRAY[CX]
3. MOV BX, [CX+DI+6]

Answers

Answer:

Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions?

1. MOV CX, [BX+DI]

2. MOV AX, ARRAY[CX]

3. MOV BX, [CX+DI+6]

General purpose application include all the following except

Answers

Answer: Web authoring

Explanation:

Here's the complete question:

General-purpose applications include all of the following except:

Select one:

a. web authoring

b. word processors

c. spreadsheets

d. database management systems

General purpose application refers to the application which can be used for different tasks. Examples of General purpose application are Spreadsheet, Word processors, Presentation software, Database management system etc.

The general purpose applications are quite different from the specialized application which focuses on a particular discipline. Therefore, the option that isn't a general purpose application is the web authoring.

General-purpose applications include all of the following except: web authoring. therefore option A is correct.

General-purpose applications are versatile software programs that can perform various tasks across different domains.

Word processors, spreadsheets, and database management systems are examples of general-purpose applications.

Word processors allow for creating and editing documents, spreadsheets help with organizing and analyzing data, and database management systems handle storing and managing data.

However, web authoring is not a general-purpose application. It is a specialized application focused on creating and designing websites. While it may have some general functionality, its primary purpose is specific to web development.

Therefore, the correct answer is "a. web authoring" as it is not considered a general-purpose application.

Know more about web authoring:

https://brainly.com/question/33531237

#SPJ6

Your question is incomplete, but most probably your full question was,

General-purpose applications include all of the following except:

Select one:

a. web authoring

b. word processors

c. spreadsheets

d. database management systems

Consider the following statements, taken from three different Jack programs. In each one of these programs, the identifier foo represents a different thing: let x = 5 + foo - a // program 1. Here foo represents a simple variable. let y = foo[12] - 3 // program 2. Here foo represents an array. let z = 2 * foo.val() // program 3. Here foo represents an object. Suppose that we are parsing any one of these statements (we don’t know which), and that the current token is foo. What kind of parser do we need to determine if we have a simple variable, an array reference or a method call?

Answers

Answer:

instanceOf

Explanation:

The parser that would be best suited for this scenario would be the instanceOf keyword, which is part of the javaParser class. This keyword allows you to check if a variable is a simple variable, an array reference or a method call through an IF statement. If it is equal to the compared type it will return a boolean value of True, otherwise it will return False. This keyword is used in Java and Javascript to check the type of the variables in scenarios such as this one.

SummaryIn this lab, you complete a partially written C++ program that includes a function named multiplyNumbers() that multiplies two int values to find their product.Three ints should be passed to the multiplyNumbers() function, the two numbers to be multiplied (num1 and num2) should be passed by value, and another int (product) to hold the product of the two numbers should be passed by reference, enabling the multiplyNumbers() function to change its value.The source code file provided for this lab includes the necessary variable declarations and input and output statements. Comments are included in the file to help you write the remainder of the program.Instructions:Open the source code file named MultiplyTwo.cpp using the code editor.Write the multiplyNumbers() function, the function declaration, and the function call as indicated by the comments.Execute the program by clicking "Run Code."Rewrite the multiplyNumbers() function to pass the two numbers (num1 and num2) by value and to pass product by address.Execute the program. It should generate the same output.// MultiplyTwo.cpp - This program calculates the product of two numbers.// It demonstrates pass by reference and then pass by address.// Input: None// Output: The product of two numbers#include using namespace std;// Write function declaration hereint main(){int num1 = 10;int num2 = 20;int product = 0;// Print value of product before function callcout << "Value of product is: " << product << endl;// Call multiplyNumbers using pass by reference for product// Print value of calculated productcout << num1 << " * " << num2 << " is " << product << endl;return 0;} // End of main function// Write multiplyNumbers function here; use pass by reference for result of multiplication. Then use pass by address.

Answers

Answer:

Declare the method prototype using:

void multiplyNumbers(int x, int y,int &product);

Call the function using:

multiplyNumbers(num1, num2,product);

Lastly, the method is as follows:

void multiplyNumbers (int x, int y,int &product) {

  product = x * y;

  return; }

Explanation:

Declare the method prototype using

void multiplyNumbers(int x, int y,int &product);

Call the function using

multiplyNumbers(num1, num2,product);

The method is as follows; the & written in front of product implies that product is passed by reference

void multiplyNumbers (int x, int y,int &product) {

This calculate the product

  product = x * y;

This returns nothing

  return; }

See attachment for complete program

1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up time for the system very quick. c) preloads the applications you use most into system memory. d) defragments the hard drive to increase performance.

Answers

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

What are the characteristic features of TFTP?

Answers

Answer:

TFTP Server is used for simple file transfer

Explanation:

Example

boot-loading remote devices

what would be the result of running these two lines of code


Ski

Surf

Jog

Hike

Answers

Answer:

Jog

Explanation:

The variable options is a list containing 5 string values

options = ["ski", "surf", "jog", "bike", "hike"]

Indexing in python starts from 0 ; hence the index values of the list values are :

0 - ski

1 - surf

2 - jog

3 - bike

4 - hike

The statement ;

print(options[2]) means print the string at index 2 in the list named options

The string at index 2 is jog ;

Hence, the string jog is printed.

Which model represents any process in general?
O A.
universal
OB.
transactional
O C.
linear
OD.
flowchart
OE.
interactive

Answers

Answer: A. universal

Explanation: correct on Plato

The process of making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment is known as _____________ maintenance.

Answers

Answer:

Corrective

Explanation:

An information system interacts with the overall system by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Corrective maintenance can be defined as the process of making significant changes to an information system in order to evolve or transform its functionality, to accommodate and tolerate continuously changing business needs, or to migrate it to a different (new) operating environment.

This ultimately implies that, a corrective maintenance is performed so as to rectify (repair) faulty equipments or systems and to restore an underperforming resource to an operational or optimum status.

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service

Answers

Answer:

it will make the wireless network faster and it is a performance network i am pretty sure.

Explanation:

Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g

Answers

Answer:

1) Execution time speed

2) Responsiveness

3) use of multi-processor architecture

4) sharing of resources

5) use of resources

Explanation:

The Distinct features are

1) Execution time speed : The time of execution in a multithreaded programming is lesser than a Non multithreaded programming which means the execution speed is faster

2) Responsiveness : Multithreaded programming languages are more responsive because every thread in the language is independent of others hence they can respond/generate responses based on its execution

3) Multithreaded programming makes use of multi-processor architecture given that each response from the threads are simultaneous

4) Ease in sharing of resources by the multiple threads found in the programming

5) Light weight of threads makes the need for resources by the threads in the programming language to be lesser when compared to other programming languages

what is gradient descent in neural networks?​

Answers

Answer:

radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction

The network performance is said to be biased when _________.

a) It performs well on train set but poorly on dev set
b) it performs poorly on train set
c) Both the options
d) None of the options

Answers

Answer:

the answer for the question is B

The network performance is said to be biased when it performs poorly on train set.

What is network performance?

A measurement regarding service or the state of quality of network received by the consumer is known as network performance. Operators can control the upper limit of a network performance.

When network operators or service providers put a cap and lower the speed of a network on a train set, it is said to be a biased network performance.

Hence, option B holds true regarding network performance.

Learn more about network performance here:

https://brainly.com/question/12968359

#SPJ2

write down the multiples of three from 474 to 483​

Answers

Answer:

474, 477, 480, 483

hope this helps

have a good day :)

Explanation:

what are the process of boots up a computer?​

Answers

Answer:

The process of boot-up a computer are: Power On, POST, Load BIOS, Operating system load, and transfer of control to the OS.

Answer:

» Switch on the power from the power source.

» The power supply sends electric signals to the motherboard.

» The BIOS performs the POST ( Power On Self Test)

» The CMOS chip loads configurations in the RAM

» The kernel of the operating system loads files in the hard disk.

» The operating system loads the welcome screen, where the computer varifies the user to see if he or she is a legitimate user through a password.

» Load the desktop.

In the header element, insert a navigation list containing an unordered list with the items: Home, Race Info, and FAQ. Link the items to the dr _index.html, dr_info.html, and dr_ faq.html files respectively.
Home
Race info
FAQ

Answers

Answer:

Explanation:

The following is a barebones HTML document that contains the Unordered List inside the header tag as requested. The list items are also wrapped around links so that they link to the requested pages and take you there when they are clicked. These html files need to be in the same folder as this code in order for it to take you to those pages. The code can be seen below.

<!DOCTYPE html>

<html>

<head>

<ul>

   <li><a href="dr _index.html">Home</a></li>

   <li><a href="dr_info.html">Race Info</a></li>

   <li><a href="dr_ faq.html">FAQ</a></li>

</ul>

</head>

<body>

</body>

</html>

Where do I look for a deep learning mentor who can assist me in my career?​

Answers

The answer:

You have to pay for it man!

Explanation:

You can find a lot of services from Fiverr and Upwork etc. But that would need to pay a lot for it.

Other Questions
Forma sintagmas verbales a partir de los siguientes verbos. (No escribas los sujetos.)a) serb) parecersec) lloverd) servire) crecerf) parecerg) regalarh) gustari) doler Zadie looked out at the expectant audience. She began to get nervous again, and she wondered if her performance would be good enough for the audience.What does the word expectant suggest about the audience in the sentence above?A. They assume Zadie will perform well.B. They are too loud for Zadie to perform.C. They do not care about Zadie's performance.D. They do not think Zadie will perform well. Which describes the greenhouse effect?a. an artificial processb. a dangerous processc. a natural processd. new process Which of the following is not a part of creating your final draft?O reviewing spelling and grammarfinding a good hookmaking sure your thesis statement is supportedlooking at each paragraph for a topic sentence and supporting sentences Which equation can be used to find mArc M N? mArc M N + 150 = 180 mArc M N + 150 = 360 mArc M N 150 = 180 mArc M N 150 = 360 12 inchesWhat is the circumference of the above circle? Use t = 3.14inches (do not round your answer) Describe the differences between work and power What was MODERN DAY bowling originally called? *1 pointAlley ballten pinEuroballknock down quick math help pls! Please I need it now A rational number is terminating decimal, if its denominator hasno prime factor other than:A. 2 and 3 B. 3 and 5 C. 2 and 5 D. 2 and 7 Can someone please help me draw op art its do today please and thank you so much if you dont know how to do it please dont answer no links can you please help me to understand the pythagorean theorem, and Trigonometry . i don't really understand it Predict the total pressure in Container C if the initial pressure inContainer A was tripled and Container B was reduced by one-third thenmixed together in Container C.SHOW ALL WORK Stalin, Mussolini, and Hitler used similar tactics to stay in power. Name and describe one characteristic of fascism that all 3 men used. Explain. Can someone help me with this please ?? 1. Sandra just opened up her own pie shop. She makes $38 on every pie that.she sells and her monthly expenses are $850. How many pies does Sandra nded tosell this month so that she can earn a total of $100 after she pays her monthlyexpenses? Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression help me plzz sorry for asking this much what is the vertex to the graph below WILL GIVE BRAINLIEST.Use the Pythagorean identity and tangent identity to find Tan if sin= -1 and 0