You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.

Answers

Answer 1

A. She has a home network with smart home devices

Answer 2

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by  doing home network with smart home devices. The correct option is a.

What are smart devices?

The devices which are operated using the analog signals which carry information.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.

Friend is able to do this by doing home network with smart home devices.

Thus, the correct option is a.

Learn more about smart devices.

https://brainly.com/question/17509298

#SPJ2


Related Questions

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

which of the following is another term for a subfolder​

Answers

Answer:

below

Explanation:

subdirectory

Explanation:

Subdirectory is the another name of sub folderwhich is the small folder of files created withing a main folder.

an option already selected by windows is called____ ( default option/ default selection)​.
this is urgent

Answers

Answer:

default option

Explanation:

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

Match each storyboarding technique with its appropriate description.​

Answers

Answer:

Hierarchical – Option C

Linear – Option D

Webbed - Option A

Wheel - Option B

Explanation:

Hierarchical means something that follows the order from general to specific .  

Hierarchical – Option C

Linear means something that follows the order from general to specific .

Linear – Option D

Webbed – There is no order in flow of information or it is inconsequential. Hence, option A

Wheel - means the flow is sequential i.e as per the sequence

Wheel – Option B

first calculating device​

Answers

Answer:

abacus is first calculating device

Fingers, people counted using fingers first.

What is the correct HTML for adding a background color?


Question 7 options:


< background>yellow


< body background-color=yellow>


< body bg="yellow">


< body style="background-color:yellow;">

Answers

Answer:

< body background-color=yellow>

Explanation:

This is the correct HTML command that is used for adding a background color of choice.

.....is used to save project in Visual basic .net from file menu

Answers

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

PLEASE HELP! Please dont answer if your going to guess
You have three modes for opening a file. You wish to create a new file and write data to

the file. What letter belongs in this line of code?

myFile = open("another.txt", "_____")
r
w
a
d

Answers

Answer:

r

Explanation:

I literally learned this today when trying to make a python server with an html file:)

Answer:

w

Explanation:

True or False

Operating systems control the loading of software applications onto a computer

All OSs offer user preferences allowing you to customize your computer

Answers

I used this from a other.

False

Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.

The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.

Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software

The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.

Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is she?

A. planning

B. design

C. development

D. testing

Answers

Answer:

The Answer Is B: Design

Explanation:

I took the test on edmentum and it was correct your welcome m8 :)

What browser do you use?
Brave
Chrome
Firefox
Opera
Edge
Tor


Answers

Answer:

Explanation:

Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.


kinetoscope

selenium

cotton

celluloid

Answers

The answer: Kinetoscope

Answer:

Celluloid

Explanation:

It is Sis

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself

Answers

Answer:

A how I feel about myself

Explanation:

Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.

1. why is manufacturing considered the biggest contributor to progress

Answers

Answer:

A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.

What form of infrastructure improved trade and communication among Roman cities?

aqueducts
canals
reservoirs
roads

Answers

Answer:

aqueducts

Explanation:

Answer:

c

Explanation:

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
port or connected wirelessly?
An attachment
A peripheral
A flash drive
A plug-in

Answers

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

The term for a device (usually external to a computer) that is plugged into a computer's communication  port or connected wirelessly is:

B. A peripheral

According to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly

As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.

Therefore, the correct answer is option B

Read more here:

https://brainly.com/question/20488785

What would you classify anti-malware software as?


SaaS

enterprising

cloud

security

Answers

Answer:

enterpriseing is the answer

Functions of file in computer ​

Answers

[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]

File in computers are used to store data, information and commands.

Thanks hope it helps.Pls mark as brainliest.

Plz help:(!!!!

Type the correct answer in the box. Spell all words correctly.

Claire wants to use a filter to ensure quality in the software development process and product. What can Claire use for this purpose?

Claire should use_________
as a filter to ensure quality in the software development process and product.

Answers

Answer:

Defect filters

Explanation:

Answer:

"a quality gate" is the correct answer :D

Explanation:

You defined a class as follows.

def __init__(self, style, color):
self.style = style
self.color = color
This portion is the _____.


creator

instantiator

constructor

initiator

Answers

Answer:

instantiator

Explanation:

MRK ME BRAINLIEST PLZZZZZZZZZZZZZZZ

Answer:

instantiator

Explanation:

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Answers

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

So task 1 requires a word processor

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

So task 1 requires a graphics software

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.

Answers

Answer:

A

Explanation:

just need to know if these are correct

Answers

Answer:

Yes, they are correct.

Answer:yea g

Explanation:

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

Readable code includes the use of
color and symbols to make the code look good.
consistent and meaningful variable names, helpful comments, and formatting.
variable names that do not vary from program to program.
comments that include the programmers' reactions to a particular piece of code used.

Answers

Answer:

bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB

Explanation:

The Readable code includes the use of color and symbols to make the code look good is; A consistent and meaningful variable names, helpful comments, and formatting.

Since Readable code is crucial for software development. It makes it easier for programmers to understand, modify, and maintain the code. It is well-organized, with consistent and meaningful variable names, helpful comments, and proper formatting.

Using consistent and meaningful variable names allows programmers to easily understand what the variable represents.

Helpful comments also play a crucial role in making the code readable. Comments should be used to explain, the code is doing, why it is doing it, and any other important details that would help programmers understand the code.

Formatting is also essential in making the code readable.

In summary, readable code includes consistent and meaningful variable names, helpful comments, and proper formatting.

Learn more about the code here;

https://brainly.com/question/14278291

#SPJ4

who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!

Answers

Explanation:

Lyrics

It's raining tacos

From out of the sky

Tacos

No need to ask why

Just open your mouth and close your eyes

It's raining tacos

It's raining tacos

Out in the street

Tacos

All you can eat

Lettuce and shells

Cheese and meat

It's raining tacos

Yum, yum, yum, yum, yumidy yum

It's like a dream

Yum, yum, yum, yum, yumidy yum

Bring your sour cream

Shell

Meat

Lettuce

Cheese

Shell

Meat

Lettuce

Cheese

Shell

Meat

Cheese, cheese, cheese, cheese, cheese

It's raining tacos

Raining tacos

Raining tacos

It's raining tacos

It's raining tacos

Raining tacos

Raining tacos

Shells, meat, lettuce, cheese

It's raining tacos

It's raining tacos

Answer:

Explanation:

is that even a real song??

btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL

You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do

Answers

Answer:

Explanation:

The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.

Other Questions
12. You and a friend are playing a game of basketball. Explain why thebasketball appears orange, be sure to use terms reflected and absorbedin your answer. [4]Help me plssss Im giving out brainlest and 10 points find each missing measure given: mHelp ASAP newsela what is a chemical reaction pppppppjnjk hieffhuie pleaase help If F(x) = +4, which of the following is the inverse of Fx)? O A. F^1(x) = 2(x-4) O B. F^1(x) = 7(x+4) O C.F^1(x) = 7(x-4) D. F1(x) = 2(x+4) who knows how to read classical guitar notes? if u do please I need to know the string number and fret the mark I made that I need help on how would blockage of the pancreatic duct affect the digestive system a) The food in the small intestine would be more basic (alkalineb) It would have little effect because liver enzymes would take overc) The small intestine would contain acidic, mostly undigested chyme.d) The stomach would be unable to function Consider the following statement: Two sets of data with the same mean will also have the same variability. Do you agree or disagree with this statement? Explain. A beagle puppy has long ears, like its parents. Which of the following bestdescribes how traits such as long ears are passed from one generation of dogs tothe next?A. The puppy inherits genes from its parents and presesses all of the traits ofboth parentsB. The puppy inherits one gene from each parent and each gene containsinformation for half of the puppy's traits,c. The puppy inherits pairs of genes from its parents, and these gene pairsdetermine the traits the puppy will possess.D. The puppy inherits pairs of genes from each parent, and these genes containchromosomes that determine the puppy's traits i stub my toe and i think i broke it Here take some pointsalso, What was the importance of the year 1932 in the history of France?-i could look it up buttttttttttttttttttttttttttttttttttttt- yea dont feel like it Find the area please :) No random answers or links, please. Emily earns $15 for each car she washes. Create an equation to represent the relationship between the number of cars washed, C, and the amount, in dollars, Emily earns, m. assume f is a one to one function of f(x)= 4-6x find f^-1(-32) plz help i will give brainliest and i will report you if you post a link The theater sells two types of tickets: adult tickets for $7 and child tickets for $4. Last night, the theater sold a total of 76 tickets for a total of $469. How many adult tickets did the theater sell last night? Find the area of the polygon shown. Enter the number into the box.ft? 1 ft 4 ft 4 ft Ava buys a book for $8.58. She pays with a $10 bill. How much change will she get? (1) $2.28 (2) $4.66 (3) $1.42 (4) $3.52 How many dogs are in the world ______la una de la tarde.A. EstaB. SonC. Es D. Esatan Help please,!!