New cars use embedded computers to make driving safer

Answers

Answer 1

Answer:

true.......................

Answer 2

New cars use embedded computers to make driving safer. The given statement is true.

What is RAM?

The word RAM stands for random-access memory and it is known as memory of short term where data is stored and as required by the processor. This is not there to deal with long term data and it is working after the computer turned off.

Generally, there are three types of RAM and these are SRAM, ECC, and DRAM. The SRAM stands for static random memory, and DRAM stands for dynamic access memory.

CPU stands for central processing unit and commonly it is known as brain of the computer, the main function of CPU is to control the function of the computer or system and it gives command to the parts of computer.

Therefore, New cars use embedded computers to make driving safer. The given statement is true.

Learn more about RAM and CPU here:

brainly.com/question/21252547

#SPJ2


Related Questions

What does the following code print?
// upload only .txt file ***************************************************** public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.

Answers

Answer:

Error - At least one public class is required in main file

if you change it too:

public class main{

   public static void main(String[] args) {

       int x=5 ,y = 10;

       if (x>5 && y>=2) System.out.println("Class 1");

       else if (x<14 || y>5) System.out.println(" Class 2");

       else System.out.println(" Class 3"); }

       // end of main

       }

       // end of class.

than it will say Class 2.

Explanation:

When an exception is thrown by code in the try block, the JVM begins searching the try statement for a catch clause that can handle it and passes control of the program to ___. Group of answer choices Each catch clause that can handle the exception The first catch clause that can handle the exception If there are two or more catch clauses that can handle the exception, the program halts The last catch clause that can handle the exception

Answers

Answer:

The answer is "the first catch clause that can handle the exception".

Explanation:

In the catch block handles the exception which is indicated by its argument, exception type, declares the type of exception, which can handle the name of a class which inherits from the "throw class", that's why As code in the try block throws the exception, the JVM looks for a catch clause that really can handle this in the try statement or transfers control of a program to first catch clause which can handle the exception.

Describing the One-to-Many Relationship
What is another name for the one-to-many relationship?
child-to-parent
O parent-to-child
O student-to-teacher
O teacher-to-student
Ve

Answers

Answer: B) Parent-to-child

Answer:

What is another name for the one-to-many relationship?

child-to-parent

Correct Answer: parent-to-child( B)

student-to-teacher

teacher-to-student

Explanation:

What kinds of components are tangible assets?

Answers

Answer:

Tangible assets are physical like cash, inventory, vehicles, equipment, buildings and investments.

Explanation:

Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​

Answers

Answer:

assuming its assembly (otherwise just delete this ans)

Explanation:

MOV TMOD , #01 ;

MOV TLO, #00 ;

MOV THO, #DCH

CPL P1.5

ACALL DELAY

SJMP HERE

;generate delay using Timer 0

DELAY:

SETB TR0

AGAIN:

JNB TF0 ,AGAIN

CLR TR0

CLR TF0

RET


1. Tracy is studying to become an esthetician. Give three reasons why she needs to have a thorough
understanding of facial machines.

Answers

Estheticians should study and have a thorough understanding of facial machines so that they can operate the machines safely, provide the best results for their clients, and enhance their service menu.

Operating Expenses for a business includes such things as rent, salaries, and employee benefits.

Answers

Overhead expenses are what it costs to run the business, including rent, insurance, and utilities. Operating expenses are required to run the business and cannot be avoided. Overhead expenses should be reviewed regularly in order to increase profitability. Overhead costs can include fixed monthly and annual expenses such as rent, salaries and insurance or variable costs such as advertising expenses that can vary month-on-month based on the level of business activity. Operating expenses are expenses a business incurs in order to keep it running, such as staff wages and office supplies. Operating expenses do not include cost of goods sold (materials, direct labor, manufacturing overhead) or capital expenditures (larger expenses such as buildings or machines). Hope this helps!

Answer:

TRUE

Explanation:

Write a program that reads in a text file, infile.txt, and prints out all the lines in the file to the screen until it encounters a line with fewer than 4 characters. Once it finds a short line (one with fewer than 4 characters), the program stops. Your program must use readline() to read one line at a time. For your testing you should create a file named infile.txt. Only upload your Python program, I will create my own infile.txt using break

Answers

Answer:

Explanation:

f=open("infile.txt","r")

flag=True

while(flag):

s=f.readline().strip()

if(len(s)>=4):

print(s)

else:

flag=False

spreadsheet formula for total 91?​

Answers

Answer:

Go to any blank cell. Enter the number 91.

Select the cell that contains 91. Press Ctrl+C to copy.

Select your range the contains numbers.

Press Ctrl+Alt+V to open the Paste Special dialog.

In the top of the Paste Special dialog, choose Values. In the Operation section, choose Add. Click OK.

Explanation:

NO LINKS OR SPAMS THEY WILL BE REPORTD

Click here for 50 points

Answers

Answer:

thanks for the point and have a great day

Which principle of layout design is shown below

Answers

…………………………………………………………..

I am a bunch of large LANS spread out over several physical locations. Who am I?

Answers

Answer:

You're WAN

Explanation:

Wide Area Network

when the tv was created (year)

Answers

Answer:

1927

Explanation:

Answer:

1971 is the year

The speed density fuel injection system uses the blank sensor as the primary sensor as the primary sensor to determine base pulse width

A. Map
B TP
C Maf
D baro

Answers

Answer:

A) Map

Explanation:

All gasoline (petrol) fuel systems need ways or method that will be calculating amount of the air that is entering the engine.This is true as regards mechanical fuel injection, carburetors and electronic fuel injection.Speed density system fall under one of this method. "Speed" in this context means the speed of the engine while "density" means density of the air. The Speed is been measured using the distributor, crankshaft position sensor could be used here. The Density emerge from from measuring of the air pressure which is inside the induction system, using a typical "manifold absolute pressure" (MAP) sensor as well as air temperature sensor. Using pieces of information above, we can calculate

mass flow rate of air entering the engine as well as the correct amount of fuel can be supplied. With this system,

the mass of air can be calculated. One of the drawback if this system is that

Any modification will result to incorrect calculations. Speed-Density can be regarded as method use in estimation of airflow into an engine so that appropriate amount of fuel can be supplied as well as. adequate spark timing. The logic behind Speed-Density is to give prediction of the amount of air ingested by an engine accurately during the induction stroke. Then this information could now be used in calculating how much fuel is required to be provided, This information as well can be used in determining appropriate amount of ignition advance. It should be noted The speed density fuel injection system uses the Map sensor as the primary sensor to determine base pulse width

The biggest limitation of a network operating system (NOS) is _____ in terms of memory, process, device, and file management.

Answers

Answer:

Lack of global control.

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) used for specific purposes and these are;

1. Batch Operating System.

2. Multitasking/Time Sharing OS.

3. Multiprocessing OS.

4. Single User OS.

5. Mobile OS.

6. Real Time OS .

7. Distributed OS.

8. Network OS.

A network operating system (NOS) can be defined as specialized computer operating system that are designed primarily for use on network devices such as routers, switches, workstations, which are mainly connected to a local area network.

Generally, the biggest limitation of a network operating system (NOS) is lack of global in terms of memory, process, device, and file management.

Type the correct answer in the box. Spell all words correctly. Complete the sentence below that describes an open standard in video production. Today, video production has become digital, and all playback devices work on the open standard known as *blank* technology.​

Answers

Answer:

digital

Explanation:

Today, video production has become digital, and all playback devices work on the open standard known as digital technology.​

why the internet is not considered a mass medium in Africa​

Answers

I think the term “media” as used and understood by most people has more to do with content than with the means of disseminating said content.

“Mass media,” therefore, would be that content created by a few and copied to the many — a large circulation newspaper, for example, or a network television or radio program.

The internet’s content is anything but “mass” in that regard — there is mass media content on it, to be sure, but there is also a panoply of content created by many for dissemination to many — or the few who are attracted by the content created by a certain few, or a certain individual. The reasons why there is not an internet infrastructure like in other regions is because in Africa people have low levels of computer literacy, there is poor infrastructures in power supply and urbanism in general, and Internet services are offered only at a high cost. Hope this helps!

Answer:

the reason why internet not considered as a mass medium is probably because most of the African are not educated and civilized, thereby making them not common to the usage of the internet.

Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​

Answers

Answer:

Write an algorithm to input a natural number, n, and calculate the odd numbers equal or less than n. ... Design an algorithm and flowchart to input fifty numbers and calculate their sum. Algorithm: Step1: Start Step2: Initialize the count variable to zero Step3: Initialize the sum variable to zero Step4: Read a number say x Step 5: Add 1 to the number in the count variable Step6: Add the ..

Explanation:

A new version of quicksort has been suggested by Professor I. M. CRAZY called CRAZYSORT in which anadversary picks the splitter in Partition in the worst possible way to maximize the running time of CRAZYSORT, thatis, line 1 of Partition (see textbook) is determined by the adversary in constant timeO(1). What is the running time ofCRAZYSORT? Justify your answer.

Answers

Thiughutghuyhhugbjjuhbuyghuughh it’s d

Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name of each creature. For your hash function, you can simply use the sum of all ASCII values. You can also come up with your own hash function. Your program should present a menu to the user allowing them to look up a creature by name. Additionally, create a function that allows the user to insert a new creature. This creature should be added to the existing hash map. If the name entered by the user already exists, DO NOT ADD IT TO THE HASH MAP. Simply report that the creature already exists. If the creature is unique and successfully added, report the calculated index value. Your hash array should start as size4. You will need to implement a rehashing function to maintain a load factor of 0.75. Collision resolution should be handled via separate chaining with linked lists.
Other Requirements
•Read in a CSV file from the command line when running the program.
•Convert the raw CSV data into the creature struct and add it to a HashMap
•Make sure you properly release all of your allocated memory.
•Format your code consistently.
•Function declarations, structs, and preprocess directives should be placed in a corresponding header file.
•Save your code for this problem ascreature_hash.(c|h).
Creature struct
typedef struct {
char *name;
char *type;
int hp;
int ac;
int speed;
} Creature;
Example Run
1. Search

2. Add Creature

3. Exit

> 1

Enter name: Terrasque

Unable to find "Terrasque"

1. Search

2. Add Creature

3. Exit

> 2

Enter name: Storm Giant

Enter type: Huge giant

Enter HP: 230

Enter AC: 16

Enter speed: 50

Storm Giant added at index 3.

CSV file: Name, hp, ac, speed, type

Rakshasa,110,16,40,Fiend
Priest,27,13,25,Humanoid
Berserker,67,13,30,Humanoid
Fire Elemental,102,13,50,Elemental
Kraken,472,18,20,Monstrosity
Centaur,45,12,50,Monstrosity
Mage,40,12,30,Humanoid
Hell Hound,45,15,50,Fiend
Basilisk,52,15,20,Elemental
Androsphinx,199,17,40,Monstrosity
Efreeti,200,17,40,Elemental
Balor,262,19,40,Fiend
Chain Devil,142,19,40,Fiend
Adult Black Dragon,195,19,80,Dragon
Adult Blue Dragon,225,19,80,Dragon
Adult Red Dragon,256,19,80,Dragon
Please help in C

Answers

Answer:

Explanation:

class TableInput{

    Object key;

    Object value;

    TableInput(Object key, Object value){

       this.key = key;

       this.value = value;

   }

}

abstract class HashTable {

   protected TableInput[] tableInput;

   protected int size;

   HashTable (int size) {

       this.size = size;

       tableInput = new TableInput[size];

       for (int i = 0; i <= size - 1; i++){

           tableInput[i] = null;

       }

   }

   abstract int hash(Object key);

   public abstract void insert(Object key, Object value);

   public abstract Object retrieve(Object key);

}

class ChainedTableInput extends TableInput {

   ChainedTableInput(Object key, Object value){

       super(key, value);

       this.next = null;

   }

    ChainedTableInput next;

}

class ChainedHashTable extends HashTable {

   ChainedHashTable(int size) {

       super(size);

       // TODO Auto-generated constructor stub

   }

   public int hash(Object key){

       return key.hashCode() % size;

   }

   public Object retrieve(Object key){

       ChainedTableInput p;

       p = (ChainedTableInput) tableInput[hash(key)];

       while(p != null && !p.key.equals(key)){

           p = p.next;

       }

       if (p != null){

           return p.value;

       }

       else {

           return null;

       }

   }

   public void insert(Object key, Object value){

       ChainedTableInput entry = new ChainedTableInput(key, value);

       int k = hash(key);

       ChainedTableInput p = (ChainedTableInput) tableInput[k];

       if (p == null){

           tableInput[k] = entry;

           return;

       }

       while(!p.key.equals(key) && p.next != null){

           p = p.next;

       }

       if (!p.key.equals(key)){

           p.next = entry;

       }

   }

   public double distance(Object key1, Object key2){

       final int R = 6373;

       Double lat1 = Double.parseDouble(Object);

   }

   }

The first real web browsers that looked even somewhat like the web we know today were not created until which year?
O 1996
1994
O 1997
O 1995

Answers

Answer:

1994 is the answer . make me brainlist

What are 3 data Gathering method that you find effective in creating interactive design for product interface and justify your answer?

Answers

Answer:

In other words, you conducted the four fundamental activities that make up the interaction design process – establishing requirements, designing alternatives, prototyping designs, and evaluating prototypes.

Explanation:

How should work be allocated to the team in a Scrum project?

Answers

Answer:

In a Scrum project, the work or the tasks are not allotted specifically. The Scrum Master is not allowed to assign tasks to the team members under any circumstance. Once the client provides the details regarding their requirements in detail, the tasks are distributed based on the expertise and skills of the employee.

Explanation:

PLEASE HELP ME ASAP!!!!

Answers

The answer is A. Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. For example by violating their privacy or endangering their device's security.

Write an interface called Shape, inside, there is a method double area(); write a class called Box which implements the Shape. In Box, there are two data members: a double called length, and a double called width. Also implements constructor, and the method area() which calculates the area by multiplying the length and width. Then write a Tester class, which has a main method and creates a box object and displays the area.

Answers

Answer:

Explanation:

The following code is written in Java. It contains the interface Shape, the class Box, and a tester class called Brainly with the main method. Box implements the Shape interface and contains, the instance variables, the constructor which takes in the inputs for length and width, getter methods for length and width, and the defines the area() method from the interface. Then the object is created within the Brainly tester class' main method and the area() method is called on that object. Output can be seen in the image attached below. Due to technical difficulties, I have added the code as a txt file below.

Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the user to enter a string which is subsequently displayed in uppercase. It is important to first ensure that string to be converted is in the a-z range. The program does not recognize any space, symbols or any kind of punctuation marks. Any time the user enters any of this character the program is going to repeatedly ask for the valid string.

An example execution of your program could be:
Please enter your string: 1winter
Invalid Entry!
Please enter your string: summer
Your capitalized string:SUMMER

Answers

Answer:

try this

Explanation:

MSG1 DB 10,13,'enter any string:-$'

MSG2 DB 10,13,'converted string is:-$'

P1 LABEL BYTE

M1 DB 0FFH

L1 DB?

P11 DB 0FFH DUP<'$'>

DATA ENDS

DISPLAY MARCO MSG

MOV AH,9

LEA DX,MSG

INT 21H

ENDM

CODE SEGMENT

ASSUME CS: CODE,DS:DATA

START:

MOV AX,DATA

MOV DS,AX

DISPLAY MSG1

LEA DX,P1

MOV AH,0AH

INT 21H

DISPLAY MSG2

LEA SI,P1

MOV CL,L1

MOV CH,0

CHECK:

CMP[SI],61H

JB DONE

CMP[SI],5BH

UPR: SUB[SI],20H

DONE: INC SI

LOOP CHECK

DISPLAY P11

MOV AH,4CH

INT 21H

CODE ENDS

END START

#Program to calculate statistics from student test scores. midterm_scores = [99.5, 78.25, 76, 58.5, 100, 87.5, 91, 68, 100] final_scores = [55, 62, 100, 98.75, 80, 76.5, 85.25] #Combine the scores into a single list all_scores = midterm_scores + final_scores num_midterm_scores = len(midterm_scores) num_final_scores = len(final_scores) print(num_midterm_scores, 'students took the midterm.') print(num_final_scores, 'students took the final.') #Calculate the number of students that took the midterm but not the final dropped_students = num_midterm_scores - num_final_scores print(dropped_students, 'students must have dropped the class.') lowest_final = min(final_scores) highest_final = max(final_scores) print('\nFinal scores ranged from', lowest_final, 'to', highest_final) # Calculate the average midterm and final scores # Hint: Sum the midterm scores and divide by number of midterm takers # Repeat for the final

Answers

Answer:

try this

Explanation:

#Python program for calculating avg

#Given data

m1 = [99.5, 78.25, 76, 58.5, 100, 87.5, 91, 68, 100]

f1 = [55, 62, 100, 98.75, 80, 85.25]

#combine scores

all_scores = m1 + f1

#number of m1 and f1

num_midterm = len(m1)

num_final = len(f1)

#find avg of scores

avg_midterm = sum(m1) / num_midterm

avg_final = sum(f1) / num_final

#print the avg

print("Average of the m1 score:",round(avg_midterm,2))

print("Average of the f1 score:",round(avg_final,2))

Write a Java program named Problem 3 that prompts the user to enter two integers, a start value and end value ( you may assume that the start value is less than the end value). As output, the program is to display the odd values from the start value to the end value. For example, if the user enters 2 and 14, the output would be 3, 5, 7, 9, 11, 13 and if the user enters 14 and 3, the output would be 3, 5, 7, 9, 11, 13.

Answers

Answer:

hope this helps

Explanation:

import java.util.Scanner;

public class Problem3 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter start value: ");

       int start = in.nextInt();

       System.out.print("Enter end value: ");

       int end = in.nextInt();

       if (start > end) {

           int temp = start;

           start = end;

           end = temp;

       }

       for (int i = start; i <= end; i++) {

           if (i % 2 == 1) {

               System.out.print(i);

               if (i == end || i + 1 == end) {

                   System.out.println();

               } else {

                   System.out.print(", ");

               }

           }

       }

   }

}

Which security measure provides protection from IP spoofing?

A ______ provides protection from IP spoofing.

PLEASE HELP I need to finish 2 assignments to pass this school year pleasee im giving my only 30 points please

Answers

Answer:

An SSL also provides protection from IP spoofing.

What is the problem with paying only your minimum credit card balance each month?
A. It lowers your credit score
B. You have to pay interest
C. The bank will cancel your credit card
D. All of the above

Answers

Answer:b

Explanation:

Answer: The answer is B.

Explanation: While yes it is important to make at least the minimum payment, its not ideal to carry a balance from month to month (You'll rack up interest charges). And risk falling into debt. Therefore, the answer is B.  

Hope this helps!

Other Questions
Question 1 (5 points) Invictus: Which of the following meanings of fell most closely matches its meaning in the following stanza?In the fell clutch of circumstanceI have not winced nor cried aloud.Under the bludgeonings of chanceMy head is bloody, but unbowed.Question 1 options:a) noun | a stretch of land on a hillb) verb | decreasec) verb | to lose balance and collapsed) adjective | cruel or terrible A 59-year-old African American female is admitted at midnight with a diagnosis of Chest Pain. She complains of a squeezing type pain across her chest and into her left jaw area. Although she cannot remember exactly when the pain began, she does remember having indigestion and being nauseas after dinner the night before, around 7:30 p.m. Vital signs are: Blood Pressure-200/110; Pulse-128 beats per minute; Respirations- 26 per minute; Temperature-99.8; Saturation of Oxygen-86% on room air; pain level 9/10. During your initial assessment, she is rubbing her mid-chest, grimacing and is diaphoretic. The pain has been occurring intermittently throughout the evening and night. Her color is pale except around her lips which are bluish. Cardiac auscultation reveals a rapid regular rhythm. She has never had this pain before. Lungs sounds are crackles in both bases with clear upper lobes. She is afraid she is going to die. Per standing orders, a nurse administers Nitroglycerine 0.4mg sublingually; applies cardiac electrodes for continuous cardiac monitoring; obtains an electrocardiogram; places a peripheral intravenous catheter with saline lock; positions patient in low Fowlers.On assessment one hour later, vital signs are Blood Pressure-180/95; Pulse-108 beats per minute; Respirations- 22 per minute; Temperature-99.0; Saturation of Oxygen-90% on 2 liters per minute; Pain level 8/10. She says her chest pain hasnt changed. Heart and lung sounds are unchanged. Color is pale without previous blue changes. EKG displays ST elevation in leads II, III, and AVF. The MD has decided not to perform a cardiac catherization, and has admitted the patient to the ICU with a cardiology consult.Required:a. Is the type of pain this patient is having typical or atypical of cardiac type of chest pain?b. What other types of pain would indicate a cardiac type problem but would not be specifically in the chest area?c. Describe how women often present with cardiac problems and how they are different from men.d. What health history information would the nurse assess for this patient?e. What abnormals are present in the patient's vital signs (first set)? Can someone please help me A nutritionist wants to estimate the average caloric content of the burritos at a popular restaurant. They obtain a random sample of 16 burritos and measure their caloric content. The sample mean and sample standard deviation of measured caloric contents of the 16 burritos are 700 calories and 50 calories, respectively. Suppose the caloric content of burritos is normally distributed. Based on the sample, which of the following is a 95% upper confidence bound for the mean caloric content of these burritos? A. 700+ t 0.05, 15x50/4 B. 700+ t 0.025, 16x50/4 C. 700+ t 0.025, 15x50/4D. 700+ z 0.05 x50/4 What letter on the map represents the Coral Sea?Group of answer choicesBACD The ways in which Asian economies have changed the global trade scenario in the last few years. Whici expression could be used to represent 2/3 pls What branch proposes and passes all legislation?executivelegislativejudicialall of the above Despus de llorar, Ana seenojada.ponaO puso 16. Identify the laws that protect society from drunkdriving.17. How can alcohol use affect a teens future?18. List three things you would say to refusealcohol.19. What organizations are involved in educatingpeople about the dangers of alcohol?20. CRITICAL THINKING Write three things youmight do to help reduce the number of teens atyour school who drink alcohol. What inference can you make from the fact that Mrs. Kosich greets Ralph by name?A. Mrs Kosich has guessed Ralph nameB. Ralph is wearing a name tagC. Mrs. Kosich Already knows Ralph D. Ralph is Mr. Kosich's son PLEASEEE HELP!!!! ILL MARK BRAINLESS FIRST PERSON!!!!! What is a noun ? Give at least twelve examples help which part control one direction transmission of impulses Find the diameter and circumference 9 m haaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalp thank you Escoja la mejor traduccin para la frase que est abajo."The actresses don't want the actors to be nervous."O A. Las actrices no quieren que los actores no estn nerviosos.O B. Las actrices quieren que los actores estn nerviosos.C. Las actrices quieren que los actores no estn nerviosos.D. Las actrices no quieren que los actores estn nerviosos. Nick's science test has a section with twelve true-or-false questions. In how many different ways can Nick answer the questions? disadvantages of parthenocarpy to the plants Give your opinion of Chief Justice Taney's reasoning regarding the deed Scott case. Do you support it? Do you think it was fair?PLEASEEE HELPPP