a system using an automated work cell controlled by electronic signals from a common centralized computer facility is called

Answers

Answer 1
I believe it’s called a centralized control system. ( correct if wrong! But glll!!

Related Questions

Identify a rule that should be added to a style sheet to access and load a web font.

Answers

The font-face rule is used to define a custom font for a webpage. It allows you to specify the font family name, the source of the font file, and various font properties such as weight, style, and format.

By using this rule, you can include custom fonts in your web pages and ensure that they are correctly displayed across different devices and browsers.

Here is an example of how the font-face rule is used:

css  code

font-face {

 font-family: 'CustomFont';

 src: url('path/to/font.woff2') format('woff2'),

      url('path/to/font.woff') format('woff');

 font-weight: normal;

 font-style: normal;

}

body {

 font-family: 'CustomFont', sans-serif;

}

In this example, we define a custom font named 'CustomFont' using the font-face rule. We provide the source of the font files in WOFF2 and WOFF formats using the src property. The font-weight and font-style properties are set to 'normal' to ensure that the font is used as intended.

After defining the font-face rule, we can use the custom font in the font-family property of the desired element (in this case, the body element).

By following this approach, you can add and use custom fonts in your web pages, providing a unique and visually appealing typography experience to your users.

Learn more about loading web fonts here:

https://brainly.com/question/9672042

#SPJ4

1. as a computer engineer, briefly explain any two types of CPU scheduling mechanisms available in modern operating systems
2. Discuss any two scheduling algorithms available in an operating system

Answers

1 Two types of CPU scheduling mechanisms available in modern operating systems are:

a) Preemptive Scheduling:

b) Non-preemptive Scheduling

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling

b) Priority Scheduling:

a) Preemptive Scheduling: In preemptive scheduling, the operating system interrupts a running process and moves it back into the ready queue in order to allow another process to execute. This is done at regular intervals or when higher priority processes arrive. Preemptive scheduling ensures that no single process can monopolize the CPU for an extended period of time.

b) Non-preemptive Scheduling: In non-preemptive scheduling, a running process must voluntarily release the CPU by either blocking itself or completing its execution before another process can execute. This type of scheduling is also known as cooperative scheduling because each process cooperates by releasing the CPU when it's done with its work.

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling: In round-robin scheduling, each process is given a fixed time slice or quantum within which it must complete its execution. If the process completes its execution within the allotted time, it is moved to the end of the ready queue. If the time slice expires and the process is not complete, it is preempted and moved to the end of the ready queue.

b) Priority Scheduling: In priority scheduling, each process is assigned a

priority level based on factors like its importance or resource requirements. The process with the highest priority is given access to the CPU first. If two or more processes have the same priority, they can be scheduled using other algorithms, such as round-robin. This algorithm is useful in situations where some processes are more important than others, such as real-time systems.

Learn more about CPU  here:

https://brainly.com/question/21477287

#SPJ11

Which of the following is NOT affected by net neutrality?

ISPs may prioritize speed and bandwidth to companies that pay more

ISPs may block websites

ISPs may give users non-unique IP addresses

ISPs may throttle users

Answers

ISPs may give users non-unique IP addresses is not directly affected by net neutrality.

Net neutrality is the principle that internet service providers (ISPs) should treat all internet traffic equally, without discriminating or charging differently based on user, content, website, platform, application, type of equipment, or method of communication. Therefore, the following options are affected by net neutrality:

ISPs may prioritize speed and bandwidth to companies that pay more: This violates net neutrality by allowing ISPs to provide better service to those who pay more and potentially disadvantage smaller or newer companies that can't afford to pay for prioritization.

ISPs may block websites: This violates net neutrality by allowing ISPs to restrict access to certain websites based on their content, potentially limiting free speech and expression.

ISPs may throttle users: This violates net neutrality by allowing ISPs to intentionally slow down internet traffic based on the content or source, potentially limiting access to information and services.

A malicious user launches in attack on a private network, and believe the attack has been successful. However, the target not work is not compromise. What security measure is it most likely using

Answers

Okay, let’s think through this step-by-step:

This private network was successfully attacked but the target system has not been compromised. This indicates that the network is likely using an effective security measure to protect itself.

The most probable security controls in place would be:

Firewall: A firewall acts as a barrier between the private network and outside threats. It is inspecting traffic and blocking malicious access attempts. This is the most likely security measure preventing the attack from reaching its target.VPN: Using a virtual private network adds an extra layer of encryption and security over the network. Only authorized users with VPN access would be able to connect to the private network, shielding it from outsiders.Endpoint protection: Software like antivirus, anti-malware, and intrusion prevention systems installed on network devices and systems. These provide real-time scanning and can detect/block the attack before it infiltrates endpoints.Network monitoring: Tools are in place to actively monitor network activity, Ethernet/Wi-Fi connections, device communications, etc. Abnormal behavior would immediately flag the attack for inspection.User authentication: Strong password requirements, multi-factor authentication, biometrics or other verification ensures only authorized users can access the private network and systems. Attacker access was blocked at the login stage.

In summary, the network is protected using a combination of controls like firewalls, VPN, endpoint security, monitoring and authentication. No single measure alone would prevent every attack, but together they are able to stop even sophisticated threats from compromising the network.

Please let me know if you have any other questions! I'm happy to explain anything in more detail.

Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection

Answers

The type of internet connection that allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection is A cable modem.

What is a cable modem?

A cable modem is known to be a type  of network bridge that assist in the area of bi-directional data communication through the use of radio frequency channels found or seen in any hybrid fiber-coaxial (HFC).

Note that the use of a modem is often in the area of connecting a said computer to any network through the use of a cable television line.

Learn more about  internet connection  from

https://brainly.com/question/529836

write a program to input a number.Find the sum of digits and number of digits

Answers

omg a computer program

i love it

okay so i will assume taht you want the program to be in python

here we go

a = int(input("Enter a number ")

b = int(input("Enter another number ")

sum = a + b

def Digits(sum):

count = 0

while sum != 0:

sum //= 0

count += 1

return count

print(f"Sum is {sum} \nnumber of digits are {Digits(sum)}")

Answer:

#Sum of Digits

a = int(input("Enter a number: "))

sumofdigits = sum(int(dig) for dig in str(number))  

print("Sum of digits: ", sumofdigits)

# Number of digits

count = 0  

print ("Total number of digits : ",len(str(abs(a))))

Explanation:

It is pretty self-explanatory however, I will tell it to you anyways. So, the sum of digits iterates to each digit and adds them up. For the number of digits, it uses in-built functions (length, string and absolute)

How is it possible for the router to know whether it is supposed to send a cat photo to your laptop
or your mom's phone or the display on your smart fridge?
O It uses the public IP address.
O It uses the POP address.
O It uses the private IP address.
O It uses the DNS address.

Answers

It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Router  is a  device that help to transfer data and across the internet or across the user device and the internet.

Private IP addresses are internet protocol addresses that is often  assign to user device by   router in order to a successful communicate to take place between the internet and user device.

Private IP addresses are mostly at:

•Home

•Office

•Business  environments

Inconclusion It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Learn more here:

https://brainly.com/question/19112414

Select all that apply.
Which of the following keys on your keyboard can you use to select more than one worksheet at the same time?
Ctri
Shift
Esc
o Alt

Answers

Hello there,
The answer is ‘CTRL’
Thanks!

What describes the curwhat is a cloud-first strategy?rent cloud landscape for business?

Answers

A cloud-first strategy promotes building software directly in the cloud rather than building on-premises and migrating to the cloud. The goal is to help you create software faster and reduce the overhead associated with on-premises resources and cloud migration.

question 107the touch screen on a mobile device is not responding to input. which of the following is the best step to take to resolve this issue?

Answers

The number of televisions per capital is calculated by dividing the number of television sets by the total US population. In this case, we divide the 285 million television sets by the population of 298.4 million.

What is use of televisison?

This gives a result of 0.9551 televisions per capita. Note that this method (dividing the number by the population) also is used for calculating the per capita of many other things like GDP.

In this case, we divide the 285 million television sets by the population of 298.4 million. This gives a result of 0.9551 televisions per capita.

Therefore, The number of televisions per capital is calculated by dividing the number of television sets by the total US population. In this case, we divide the 285 million television sets by the population of 298.4 million.

Learn more about television on:

brainly.com/question/16925988

#SPJ1

How is a procedure different than a function?

Answers

Answer: A procedure is used to perform certain task in order.

I don’t want you going back and to send it back and to do the other things that you are going yyt I don’t think gonna was the

Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that ebba should undertake?.

Answers

The first step that Ebba should take is: Information gathering and Reconnaissance.

What is an In-house Penetration Test?

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

https://brainly.com/question/19085749

Could someone please tell me why the highlighted statement is returning 0.00000 instead of 9.1 (my input)? (IN DETAIL)

p.s. this is C programming language.

Could someone please tell me why the highlighted statement is returning 0.00000 instead of 9.1 (my input)?

Answers

Answer:

You need to change the data type of "points" to a double.

Could someone please tell me why the highlighted statement is returning 0.00000 instead of 9.1 (my input)?

What is the difference between a laptop and a notebook.

Answers

Answer:

Explanation:

A laptop computer, or simply a laptop, is a portable computer that usually weighs 4-8 pounds (2 to 4 kilograms), depending on display size, hardware, and other factors. A notebook is a personal computer that foregoes some functionality to remain lightweight and small.

What does initializer for conditional binding must have optional type

Answers

Optional chaining is a process for querying and calling properties, methods, and subscripts on an optional that might currently be nil

What does initializer for conditional binding must have optional type?

The following code throws a message which says "Initializer for conditional binding must have Optional type, not 'AnyObject'"

   func parseData2(){

       var data:NSData?

       if let data2 = data  {

           do {

               let details = try NSJSONSerialization.JSONObjectWithData(data2, options: .AllowFragments)

               if let actualDetails = details where actualDetails.isKindOfClass(NSDictionary) {

                   print("Parse Data")

               }

           }catch {

               print("Error \(error)")

           }

       }

   }

To resolve the above error I used the following code.

func parseData2(){

       var data:NSData?

       if let data2 = data  {

           do {

               let details:AnyObject = try NSJSONSerialization.JSONObjectWithData(data2, options: .AllowFragments)

               if let actualDetails:AnyObject = details where actualDetails.isKindOfClass(NSDictionary) {

                   print("Parse Data")

               }

           }catch {

               print("Error \(error)")

           }

       }

func parseData2(){

       var data:NSData?

       if let data2 = data  {

           do {

               let details:AnyObject = try NSJSONSerialization.JSONObjectWithData(data2, options: .AllowFragments)

               if let actualDetails:AnyObject = details where actualDetails.isKindOfClass(NSDictionary) {

                   print("Parse Data")

               }

           }catch {

               print("Error \(error)")

           }

       }

   }

   }

func parseData2(){

       var data:NSData?

       if let data2 = data  {

           do {

               let details:AnyObject = try NSJSONSerialization.JSONObjectWithData(data2, options: .AllowFragments)

               if let actualDetails:AnyObject = details where actualDetails.isKindOfClass(NSDictionary) {

                   print("Parse Data")

               }

           }catch {

               print("Error \(error)")

           }

       }

   }

There is one more code which I want to add considering nil check,type check and then type cast check. The reason behind that Swift offers great flexibility but litle bit difficult to fix issues. Let's say I have a dictionary, cityDetails and I am trying to get data for self.cityZipCode and self.cityIdentifier, which are optional, defined as var cityZipCode:Int? and var cityIdentifier:Int?

if let cityBasic = cityDetails["basicDetails"] where

cityBasic!.isKindOfClass(NSDictionary) {

self.cityZipCode = (cityBasic as! NSDictionary)["zip"].integerValue ?? 0

self.cityIdentifier =  (cityBasic as! NSDictionary)["cityId"].integerValue ?? 0

To learn more about binding refers to:

https://brainly.com/question/26052822

#SPJ4

what is the relationship between http and www?​

Answers

Answer:

The very first part of the web address (before the “www”) indicates whether the site uses HTTP or HTTPS protocols. So, to recap, the difference between HTTP vs HTTPS is simply the presence of an SSL certificate. HTTP doesn't have SSL and HTTPS has SSL, which encrypts your information so your connections are secured.

Answer:

Simply put, Http is the protocol that enables communication online, transferring data from one machine to another. Www is the set of linked hypertext documents that can be viewed on web browsers

Explanation:

Do a quick search for “The Sun”. What types of results do you see?

Answers

Answer:

What happens when you look at the Sun?

When you stare directly at the sun—or other types of bright light such as a welding torch—ultraviolet light floods your retina, literally burning the exposed tissue. Short-term damage can include sunburn of the cornea—known as solar keratitis. ... This occurs when UV light literally burns a hole in the retinal tissues.Oct

50 POINTS I need help on this before I actually buy the video card.
My processor is an Intel Xeon X5690 3.47 Gigahertz, and the turbo is 3.73 Gigahertz with 12 gigabits of installed ram.

Answers

Answer:

Specifications

Export specifications

Essentials

Product Collection

Legacy Intel® Xeon® Processors

Code Name

Products formerly Westmere EP

Vertical Segment

Server

Processor Number

X5690

Status

Discontinued

Launch Date

Q1'11

Lithography

32 nm

Recommended Customer Price

$1666.00

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do

Answers

Answer:

Configure account policies in Group policy.

Explanation:

what is the true colar of water

Answers

Answer:

blue

Explanation:

becausse it's blue and it's water

It’s translucent it doesn’t have a color it looks blue cause of the sky?

ASAP!
Use the drop-down menus to complete the statements about Contacts and the Contacts View.

A ( Task, calendar, or contact ) is an object stored in Outlook that contains information about individual people you want to communicate with.

Use the ( Mail, people, or calendar ) icon in the Navigation pane to see the Contacts View page.

Answers

Answer:

Contact

People

Explanation:

Which of the following is a true statement about the differences between the Menu bar and the Icon bar? 1. The Icon bar is located at the top of the main QuickBooks window. 2. There are more options available through the Menu bar than through the Icon bar. 3. The Home Page can only be accessed through the Icon bar.
4. The Menu bar is located on the left side of the main QuickBooks window. 5. None of the above statements are true.

Answers

The true statement about the differences between the Menu bar and the Icon bar is: 2. There are more options available through the Menu bar than through the Icon bar.


What is th Menu bar?

The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.

The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application window, that controls software functions.
The Menu bar is located at the top of the main QuickBooks window and offers a wide range of options and features, while the Icon bar provides shortcuts to commonly used tasks. The Home Page can be accessed through both the Menu bar and the Icon bar, and the Menu bar is not located on the left side of the main QuickBooks window.

What is Icon bar?

An Icon Bar provides a menu to quickly navigate an app. Use the Icon Bar horizontally or vertically, with the labels below the icons or to the right.

to know more about  menu bar and icon bar:

https://brainly.com/question/20380901

#SPJ11

which trunk standard enables you to connect switches from different manufacturers?

Answers

The trunking standard that enables the connection of switches from different manufacturers is called IEEE 802.1Q (also known as VLAN tagging or dot1q).

IEEE 802.1Q is a widely adopted trunking standard in networking that allows for the interconnection of switches from different manufacturers. It provides a mechanism for creating and managing Virtual LANs (VLANs) and facilitates the transmission of VLAN information across network devices.

With IEEE 802.1Q, VLAN tagging is employed to identify and distinguish different VLANs as traffic traverses through switches. It adds a tag or header to Ethernet frames, containing VLAN-related information such as the VLAN ID. This tagging allows switches to recognize and handle VLAN traffic appropriately, regardless of the switch manufacturer.

By adhering to the IEEE 802.1Q standard, network administrators can deploy multi-vendor environments and seamlessly connect switches from different manufacturers while maintaining consistent VLAN configurations and interoperability. This standardization enables greater flexibility, scalability, and compatibility in building complex network infrastructures that involve switches from various vendors.

In conclusion, the trunking standard IEEE 802.1Q (VLAN tagging) enables the connection of switches from different manufacturers by providing a consistent method for transmitting VLAN information across network devices. It promotes interoperability and allows for the creation and management of VLANs in multi-vendor networking environments.

Learn more about  networking here :

https://brainly.com/question/33444206

#SPJ11

Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations

Answers

Answer:

D i think

Explanation:

a set of these should exist in both document form and software form for any organization.:__

Answers

A set of these should exist in both document form and software form for any organization are the standard operating procedures (SOPs).

SOPs are a set of instructions that outline how specific tasks should be performed in an organization. These procedures are essential to ensure consistency and efficiency in operations, reduce errors, and improve productivity.

Having SOPs in document form is necessary as it provides a physical copy that can be accessed easily by employees and stakeholders. This form can be printed and distributed to all relevant personnel, ensuring that everyone is aware of the procedures. It also serves as a reference document that can be used to train new employees.

To know more about software visit:-

https://brainly.com/question/985406

#SPJ11

Most jet engines today use what type of design?

Answers

Answer:

Explanation:

The 5 Main Types of Aircraft Jet Engines

Turboprop Engine.

Turbojet Engine.

Turboshaft Engine.

Turbofan Engine.

Ramjet Engine.

do you feel me?
take a look inside my brain
the people always different but it always feels the same
thats the real me
pop the champagne
the haters wanna hurt me and im laughin at the pain

Answers

stayin still eyes close let the wound just pass me by, pain pills nice clothes if i fall i think i'll fly touch me midas, make me part of your design. None to guide us I feel fear for the very last time

A five-paragraph essay question is one of the three types of response questions.
Please select the best answer from the choices provided
OT
OF

Answers

Answer: False

Explanation:

It should be noted that the fill in the blank questions are being regarded as the response questions. The three types of response question include the quick time response, lag time response and the no response.

When the individual knows the answer immediately after reading a particular question, it's regarded as quick time response while it is lag time when one doesn't know it immediately.

It should be noted that the five-paragraph essay question is not one of the three types of response questions. Therefore, the answer is false.

In your own words and in great detail explain the characteristics of the image types listed below. Give an example of when would be best to use each image file type.



1. JPG



2. PNG



3. GIF



4. PDF



5. SVG

Answers

Answer:

JPG It's a standard image format for containing lossy and compressed image data. PNG “Portable Graphics Format”. It is the most frequently used uncompressed raster image format on the internet .GIF is a lossless format for image files that supports both animated and static images. It was the standard for 8-bit color images on the internet until PNG became a viable alternativePDF Portable Document SVG scalable vector graphics, and it is a file format that allows you to display vector images on your website.

Explanation:

Despite the huge reduction in fil e size JPEG images maintain reasonable image quality. This lossless data compression format was created to replace the Graphics 2.Interchange Format (GIF) Like GIF images, PNG also have the ability to display transparent backgrounds.You may have seen them used often in email signatures. Animated GIFs are several images or frames combined inUsed to display documents in an electronic form independent of the software, hardware or operating systemThis means that you can scale an SVG image up and down as needed without losing any quality, making it a great choice for responsive web design they are viewed onto a single file

Which option is a means of reporting events via the Internet? O A. Taking photos to upload O B. Browsing for fun O C. Downloading music videos D. Searching with search engines​

Answers

Answer:

your answer is A!

Explanation:

photos are often a great form of proof or example material when reporting something over the web!

Other Questions
Can someone help me g? Stimulus: The student is presented with a polygon (square,rectangle, parallelogram, or night triangle) on a grid and the scalefactor at which it was created.Example Stem: This diagram of a rectangular city park was drawnusing a scale factor of 1 centimeter to 20 meters.In the diagram shown, assume each square on the grid is 1centimeter in length.What is the area, in square meters, of the actual park on which thisscale drawing is based? By far, the most popular expansion board NIC today is one that uses a(n) ___ bus. a. onboard b. PCIe c. ExpressCard d. ISA. Janet was surprised to find out that her dentist, Dr. Herring, was good friends with her tennis partner, Sally. Janet met Sally years ago in graduate school, while Dr. Herring knows Sally from church. The nature of each one's relationship to Sally is what sociologists call a(n) A manufacturer of game controllers is concerned that their controller may be difficult for left handed users. They set out to find lefties to test. About 13% of the population is left handed. If they select a sample of five customers at random in their stores, what is the probability of each of the following outcomes?a. The first lefty is the fifth person chosenb. There are some lefties among the 5 peoplec. The first lefty is the second or third persond. There are exactly 3 lefties in the groupe. There are at least 3 lefties in the groupf. There are no more than 3 lefties in the group a large part of the cost of distribution is storage. storage costs include: may we met again !i love you,ella YALL YALL PLS PLS PLSS HELP MEH! o my ocial tudie teacher gave me thi aignment:you are uppoed to pick 3 thing you did thi unit for ocial tudie and write why you choe it and what you learned. Then at the end you are uppoed to write a 3-5 entence ummary for the unit. Btw the unit i about the great depreion but it mainly jut the dut bowl. PLS HELP IM TOO DUM TO DO THIS!!!!! What is sex linked traits? health question down below Which performance measurement approach do the UberCompany uses for performance measurement solutions? Please help!!!!!! Ill give brainliest:) A nurse is caring for a client prescribed phenylephrine nasal spray who is experiencing rebound congestion after using this medication. List one (1) action to teach the client as a preventative measure to prevent rebound congestion. petes pizzeria and abortion clinic where yesterdays loss is today's special sauce This is a wave. What two senses use waves? Suppose 0.438 L of 0.152 M NaOH is diluted with water to a final volume of 3.00 L. What is the pH of the dilute solution? a. 12.346 b. 12.705 c. 13.182d. 1.654 e. 1.295 in a perfectly competitive industry, it is relatively easy for new firms to enter the market and pre-existing firms to exit the market. true false Based on the assumption that individuals seek to maximize the return (in calories and nutrients) on their labor, __________ is a model used by anthropologists to how food-collectors decide which animals and plants to hunt or collect and which to ignore,. the price of a theater ticket increased from $7.50 to $7.75. the theater sold 315 ticket at the higer price with the price increase how much more did the theater earn on the tickets Select the car that has the best fuel efficiency (greatest number of kilometers per liter of gasoline). Choose 1 answer: Choose 1 answer: (Choice A) A (Choice B) B Car B uses 101010 liters to travel 110110110 kilometers. (Choice C) C Car C Kilometers Liters 484848 444 606060 555 727272 666