1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
1 year ago
14

in the future, mobile technologies are expected to be used more than desktop computers today. what other improvements are helpin

g support mobile computing?
Computers and Technology
1 answer:
vekshin11 year ago
4 0

The improvement that are helping support mobile computing is increase data storage online and more applications for mobile phone.

If the data storage capacity is increased, we will get a larger amount to store our files. We get more space to store our important files and access them as easily as possible. Mobile applications need to be improved, because with more applications we will find it easier to use these applications to help us do our work. With a larger number of data storage, we could be comfortable because data storage can increase your employees' flexibility by enabling them to access data anytime they want from any location.

Learn more about data storage online at brainly.com/question/13650923

#SPJ4

You might be interested in
Which social networking function came first?
amm1812

D, Online bulletin boards.


♣Amaranthine
3 0
3 years ago
Read 2 more answers
Are there any output differences between floats and doubles?
lana [24]

Explanation:

The precision in double values is twice as compared to float values.Hence double have smaller rounding errors as compared to float variables .A double is of 64 bits and float is of 32 bits usually hence floats have more rounding errors and on more number than doubles.Double has 15 decimal digits of precision and float has only 7 decimal digits for precision.

5 0
3 years ago
Choose all that apply.
kirill115 [55]

Answer:

Bullets can be turned off and on.

Lists don't have to use numbers or bullets.

Explanation:

because L just wanted the light

6 0
3 years ago
Read 2 more answers
For each item, identify the way it is usually addressed in the software industry. Applying a bug fix: Addressing a security flaw
Sonja [21]

Answer:

(patch)

(patch)

(new version)

(new version)

Explanation:

gimme my 5 stars

6 0
3 years ago
Read 2 more answers
According to Metcalfe's law, if a second computer is joined to a first, the value of the network created is how many times great
Nataly_w [17]

Answer:

Four times

Explanation:

Metcalfe's Law is a theory used in digital networks and telecommunications to symbolize the value of a network. According to the law a network's impact is the square of the number of nodes in that network at that given time. For instance, if a network has 10 nodes, its intrinsic value will be 100 (10 * 10).

The law also states that if a second computer is connected to a first, the value of the network created will be four times bigger than the value of the original computer.

7 0
3 years ago
Other questions:
  • Tony Stark wants to build a 1000 meter high tower as quickly as possible. He has unlimited resources and an unlimited budget and
    8·2 answers
  • Rose has a list of two columns of information separated by tabs. She wants to input this information into a table. What is the f
    15·2 answers
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Which symbol is used to identify edge-triggered flip-flops? a triangle on the clock input. the letter e on the enable input. a b
    14·1 answer
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!