1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
15

Aside from the smart cell phones used by a billion people, list and describe four

Computers and Technology
1 answer:
Pie3 years ago
5 0
Gaming Computers- High processing speed and designed to be used for gaming.
Handheld Computers- The things that are being used by Billions of people. Firstly designed as an Internet Browser, now can be used in gaming and office purposes
Mainframe Computers- The large boxes (computers) that you see in server rooms. Designed to be used on processing large quantities of data on the same time.
Office Computers- The things you see in your office. Cheap computers that is undercut in processing speed, and designed to run Office applications.
that's​all I know. have a good day :)
You might be interested in
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
1 year ago
. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understo
aksik [14]

Answer:

Explanation:

The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.

class Dollar {

   int dollars;

   double coin;

   private Dollar(int dollar, int coin) {

       this.dollars = dollar;

       this.coin = Double.valueOf(coin) / 100;

   }

   

}

4 0
3 years ago
A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web br
Cerrena [4.2K]

Answer: (B) Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

Explanation:

Port 80 is used by HTTP, 110 by pop3 to retrieve emails from web servers, 143 by imap for internet messaging and 443 is used for TCP for websites using SSL. So if the firewall is allowed to accept inbound traffic to these ports 80,110,143 and 443 then it would be possible to retrieve emails.

3 0
3 years ago
True or false windows 98 and windows xp are examples of an operating system?
rodikova [14]

Answer:

true

Explanation:

3 0
2 years ago
"Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w
Galina-37 [17]

Answer:

Option C i.e., RIPEMD is the correct option for the following question.

Explanation:

Because RIPEMD is the algorithm that is used for the hash primary design characteristic which has two independent and unlike parallel chains of the calculation and computation and the outputs of which are then linked to the process at the end. It is also used for the safe process of replacing the 128-bit hash method.

Other options are wrong because these are not related to the following statement.

5 0
3 years ago
Other questions:
  • (GAME DESIGN)
    15·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • Using Matlab programming I need to rotate the line defined by x,y by 45 degrees around 2,2
    13·1 answer
  • A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application
    6·1 answer
  • Choose all items that represent HTML characteristics.
    5·2 answers
  • Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
    11·1 answer
  • "To speed up magnetic hard drive performance , ___________ is often used. "
    15·1 answer
  • Write a Python class that inputs a polynomial in standard algebraic notation and outputs the first derivative of that polynomial
    9·1 answer
  • Why do meteorologists use data such as temperature, wind speed, and air
    9·1 answer
  • What are the different types of computer operating systems?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!