Match the characteristics to the mobile operating system that it describes.

1. simple, user-friendly design Apple iOS
2. preferences personalized Microsoft
3. limited number of available apps Android

Answers

Answer 1

Answer:

1. is Apple's iOS

2. is Android

3. is Microsoft


Related Questions

Who is Carl Thompson?

Answers

Carl Thompson was a well know Jazz player back in the mid 1900s

A man-in-the-middle attack or impersonation are likely to result in problems with

data availability.

data confidentiality.

data integrity.

data mining.

Answers

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.

What is a  man-in-the-middle attack?

A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.

Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.

Therefore, option B is the correct option.

Learn more about man-in-the-middle attack, here:

https://brainly.com/question/13014110

#SPJ6

One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.

Answers

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!

what method of technical drawing uses converging lines?

Answers

The foundation of linear perspective is the concept of diminution, which states that objects appear to get smaller as they travel farther away from the observer.

What's a good illustration of linear perspective?

The seeming convergence of two parallel lines, particularly when looking at a lengthy section of two-lane highway, is an illustration of linear perspective. People who watch the highway in front of them have the impression that the lanes are converging at the horizon.

One kind of linear perspective is one point perspective. In a flat work of art, linear perspective creates the appearance of space and form by using lines to depict objects. It is a methodical method of drawing. One point perspective, which only uses one vanishing point, earns its name.

There are three forms of linear perspective. One point, two point and three point. When the vanishing point for the objects in your picture is close to the center of the scene, you have one point perspective, which is the simplest sort of perspective.

To learn more about linear perspective  refer to

https://brainly.com/question/22902116

#SPJ1

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

in ICT what is the difference between Save and Save As

Answers

Choosing "Save" simply saves your work by updating the last saved version of the file to match the current version you see on your screen.

Choosing "Save As..." brings up a prompt to save your work as a file with a different name. For example, you might choose to save a document called "Paper - rev. 3" as "Paper - rev. 4". This way, you can save you file at different stages and keep multiple versions on your hard drive.

Choosing "Save" and then "Save As..." is also a good way to make a backup of your file. Just be sure to rename the file something new when you choose "Save As..." or you will overwrite the current saved version, just like choosing the "Save" command would do.

Answer:

Save updates the files that are already created.

Save as creates a new file or store the existing file in a new location.

concept of green computing​

Answers

Answer:

Reducing Environmental Impact of Technology

Explanation:

The main concept of green computing is to reduce the environmental impact that technology has. This revolves around everything that has to do with technology and computing. Including using technology and software to create solutions to better the environment, while also using computing resources as efficiently as possible. Then when the physical devices are obsolete, recycle as much as possible in order to reduce the physical waste that technology has on the environment.

What is the dark, sticky substance that forms when tobacco is burned?

Answers

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important

Answers

Answer:

1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.

2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.

3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.

why you think they are important

1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.

2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.

3. Any weakness in communication skills could affect the project generally.

What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?

Answers

so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.

-scav

Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
a
Create drones
b
Make 3-D prosthetics
оо оо
с
Plant agriculture
d
Use 4-D special effects

Answers

3-D prosthetics would most likely be the answer, also, don’t copy links it’s most likely not the answer anyways.

The healthcare industry uses computer programming will be Make 3-D prosthetics. Then the correct option is B.

What is the healthcare industry?

The healthcare business, also known as the medicinal industry or the medicine economy, is an amalgamation and combination of economic segments that offer products and services for the treatment of patients in the curative, preventative, rehabilitative, and pastoral care categories.

Uses of the healthcare industry are given below.

Apps with medical databases or references.Applications for tracking chronic diseases.Applications for diagnosis with a focus on prevention.Applications for people's health.Apps for better health.Apps for psychological health.

Thus, Computer programming is used in the healthcare sector to create three-dimensional prostheses. Then the correct option is B.

More about the healthcare industry link is given below.

https://brainly.com/question/14379549

#SPJ2

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.

Answers

Answer:

The characteristics of calendar sharing options in Outlook 2016 are;

1) The most common thing to share in Outlook is the calendar

2)  The Publish Online option is for users outside an organization

4) Publishing a calendar online will allow anyone in the world to see it

5) The Share option opens an email message that sends the calendar link

6) Calendar sharing options include Email, Share, Publish Online, Delegate

Explanation:

1) Sharing is used mostly by a group of people working on a given project

Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)

Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar

2) The Publish Online option allows a user to make a calendar available to people outside the organization

3) The calendar sharing permissions are;

a) Who can view the date and time marked as busy

b) Who can view the location and titles of appointments

c) Who can view all the calendar details

d) Who can edit

e) Who can delegate

Therefore, changes in calendar permissions does not only change what the user can see

4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization

A published calendar can be viewed by everyone that has the calendar link

Therefore, publishing a calendar online will allow anyone in the world to see it

5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button

Therefore, the Share option opens an email message that sends the calendar link

6) Calendar sharing options includes

a) Sharing the calendar within the organization

b) Publishing a calendar to the web to share the calendar

c) A calendar can be shared in an email

d) Authority can be delegated to a particular calendar

Therefore, calendar sharing options include Email, Share, Publish Online, Delegate

1, 2, 3, 5

just did it

A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C

Please select the best answer from the choices provided
A
B
C
D

Answers

I think the answer is D

Answer:

D

Explanation:

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. What could you do to add an additional layer of security to this organization

Answers

The answer is Train the receptionist to keep her ipod in a locked drawer when not in use. Disable the network jacks in the reception area

Train the receptionist to keep her ipod in a locked drawer when not in use.

What is ipod?

Apple Inc. created and marketed the iPod line of portable media players and multifunctional mobile gadgets, which has since been discontinued.  On October 23, 2001, the initial version of iTunes was made available, almost 8 and a half months after the Macintosh version.

As of 2022, Apple is anticipated to have sold 450 million iPod products. On May 10, 2022, Apple stopped producing the iPod range of products. The iPod brand was abandoned by Apple the longest, after more than 20 years.

Some versions of the iPod can act as external data storage devices, just like other digital music players. Before macOS 10.15, users could transfer contacts, e-mail settings, calendars, music, photographs, movies, games, and other content to devices that supported the iTunes program from Apple.

Therefore, Train the receptionist to keep her ipod in a locked drawer when not in use.

To learn more about ipod, refer to the link:

https://brainly.com/question/119195

#SPJ5

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

Write a Python code to take input of age of three people by user and determine youngest people among them

Answers

Answer:

# Take Ages

person1 = eval(input("Enter age of person 1 : "))

person2 = eval(input("Enter age of person 2 : "))

person3 = eval(input("Enter age of person 3 : "))

# check youngest

if person1 < person2 and person1 < person3:

print("Person 1 is youngest")

elif person2 < person1 and person2 < person3:

print("Person 2 is youngest")

elif person3 < person1 and person3 < person2:

print("Person 3 is youngest")

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do

Answers

Answer:

Have them try again. If it still is wrong then maybe dont let them use the internet!

Consider the following code segment.
int[][] multi = new int[4][4];

for (int rows = 0; rows < 4; rows++)

{

for (int cols = 0; cols < 4; cols++)

{

if (cols == 0)

{

multi[rows][cols] = 0;

}

else if (cols == 1)

{

multi[rows][cols] = 1;

}

else if (cols == 2)

{

multi[rows][cols] = 2;

}

if ((rows % 2 == 0) && (cols % 2 == 0))

{

if ((rows >= 2) && (cols <= 2))

{

multi[rows][cols] = 9;

}

}

}

}

As a result of executing the code segment, how many elements in the two-dimensional (2D) array multi will store the value 9 ?


A) 0
B)1
C)2
D)4
E)6

Answers

Answer:

C

Explanation:

C.10 15 20 35

30 35 40 45

50 55 60 65

As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

How the elements in the array can be calculated?

Given the array

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

Therefore, As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

Learn more about array on:

https://brainly.com/question/13107940

#SPJ2

Complete the sentence with the correct response.

When choosing a new computer to buy, you need to be aware of what operating it uses.

Answers

Answer:

When choosing a new computer to buy, you need to be aware of what operating system it uses.

Explanation:

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.

hi please help ASAP it's about html!​

Answers

Given :-

Create a HTML code for writing a web page for your school time-table.

Answer :-

<html>

<head>

<title> Time Table </title>

</head>

<hrcolor = "red">

<hrcolor = "blue">

<body>

<table><tr = "7"><md = "7"><Period 1_></table>

</body>

</html>

[tex] \\ [/tex]

Answered by - ItzMaster

Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?

Answers

Answer:

I'm pretty sure this is not possible on Windows OS.

Explanation:

Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.

what are the answers for Quiz 7 answers computer science principles

Answers

Answer:

unknown

Explanation:

this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this

another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence

that and people are more willing to answer one question at a time then a whole quiz lol

not saying what you are doing is bad, its just impractical and not an easy way to go about this

hope you find the answers you need, have a great day/night mate :D

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

z 1
-- = --
7 21
solve​

Answers

Answer:

[tex]z= \frac{1}{3}[/tex]

Explanation:

Given

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Required

Solve

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Multiply both sides by 7

[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]

[tex]z= \frac{1}{21} * 7[/tex]

Rewrite as:

[tex]z= \frac{1 * 7}{21}[/tex]

[tex]z= \frac{7}{21}[/tex]

Simplify fraction

[tex]z= \frac{1}{3}[/tex]

True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.

Answers

Answer:

true

Explanation:

true true true true true

___________ helps businesses conduct interactive meetings online, including conferences, training, support sessions, and client presentations.

Answers

Answer: Web Conferencing

Explanation:  I was gonna say technology but that's super broad. It could also be collaborative tools but I think this is the correct answer.

Other Questions
could someone please check my work! no files please and thank you! 8. What is the value of x? Pls show work thank you Write the equation of the line that passes through (5.-9) and (2.5). which of the following statements about blood alcohol concentration (BAC) are true?A. its illegal for a driver under 21 years of age of to drive with a BAC of 0.02% or aboveB. it is illegal for a driver at any age to drive with a BAC of 0.08% or above C. Both A and B are true D. Neither A or B Imagine the Earth takes longer to complete one revolution. How would that affect a solar day? A sidereal day? you get $2,000 loan at 9% interest rate and pays it back in 6 months. how much intereast will you pay on the loan translate 10 words in to different language evaluate X in 6561=9x[tex]6561 = 9x [/tex] What is the volume of a rectangular prism that has a height of 2 inches a width of 2 and 1/2 inches and a length of 5 and 1/2 inches? Help me, best answer will be marked Brainliest. Clare buys an item that normally costs $36. After using a coupon, the price came down to $27 before taxes. What percent off was this coupon? What is MOST likely TRUE about rock music today? . The artists who create it are not primarily concerned with making money. B. The songs of this genre are mainly focused on making social protests. C. The music revolves around the themes of relationships, youth, and love. D. This music genre is seen as more aggressive and innovative than pop music, please please do a step by step of how to solve the equation and the answer! please and thank you! Which of the following words has the same meaning as commerce? A. business B. religion C. village D. government A gas has a volume of 0.50 L, a pressure of 0.5 atm, and a temperature of 40C. What will be the new temperature if the gas is expanded to 5.0 L and a pressure of 0.10 atm? Apostles spread the message of Jesus by traveling across the Mediterranean region setting up churches and telling people about Jesus.True or False helppp helping my sister A school ordered 32 orange shirts, 29 blue shirts, and 34 green shirts. The shirts are being divided equally among 6 classrooms. If each classroom gets the same number of shirts, how many shirts will be left over? A. 2 B. 4 C. 5 D. 3 Manuel: Mi primo tuvo un accidente. Paramdico: Qu pas? Manuel: Se cay de una escalera y ____________ la cabeza. Evaluate the expression 2x + 5 when x = 4