1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
4 years ago
13

The android operating system is used by many popular tablet computers. which tablet does not use the android operating system

Computers and Technology
1 answer:
aleksandrvk [35]4 years ago
3 0
Apple Ipad and Microsoft Tablets.
You might be interested in
Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be coll
boyakko [2]

Answer:

Access includes a Navigation Control that makes it easy to switch between various forms and reports in your database. A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database.

Explanation:

yes

3 0
3 years ago
Read 2 more answers
Why are many otherwise safety-conscious people victims of internet crime?
const2013 [10]
Because <span>safety-conscious people don't install virus protectors. Hope this helps.</span>
8 0
3 years ago
Read 2 more answers
Mia’s bank statement shows a closing balance of $75.65. There are no outstanding check or deposit. Her checkbook show a balance
ankoles [38]
The difference ($2.30) could be due to a fee for an ATM withdrawal, a math error, writing in the wrong amount
3 0
3 years ago
Who is the mother of computer science ?<br>Thank you ~​
Pepsi [2]

Answer:

ADA LOVELACE

Explanation:

Ada Lovelace was born into a historically famous family. She could have lived well through her father's fame and her mother's money-instead she decided to write a computational algorithm, earning her the title of the mother of programming, and became the first computer programmer in the mid-1800s1,2.

HOPE IT'LL HELP

3 0
2 years ago
Read 2 more answers
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Other questions:
  • Each frame is composed of a number of colors recorded in digital format; we call these pixels. What information does the number
    15·1 answer
  • C# The video game machine at your local arcade output coupons according to how well you play the game. You can redeem 10 coupons
    8·1 answer
  • Which field data type would you use if you'd like to store videos in that field a text b memo c Boolean D binary object E null
    11·2 answers
  • .In Linux what command sequence do we enter to stop a program?
    11·1 answer
  • _ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
    6·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • What is the general form of an internet email address<br>​
    5·1 answer
  • What is computer graphics uses of computer graphics​
    14·1 answer
  • Which of the following makes Super Mario Run unique?
    6·1 answer
  • The counting function uses only ___________________ arguments
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!