1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
10

Most smartphones use operating systems developed by ________.

Computers and Technology
1 answer:
konstantin123 [22]3 years ago
4 0
The majority of the mobile market is composed of Android OS phones and iOS phones. 
You might be interested in
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
4 years ago
You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
tiny-mole [99]
The answer you're looking for might be "backwards-compatible".
7 0
4 years ago
Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calen
olga nikolaevna [1]

Answer:

is there a pic or something, sorry i cant help at the time being

Explanation:

5 0
3 years ago
When would you include an executive summary in a report
Hoochie [10]

Answer:

When the report is too long and complex. The executive summary provides a snapshot of what the report talks about at a high level. When the reader needs more details, they can go through the detailed report.

Explanation:

7 0
3 years ago
Read 2 more answers
"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard
Jobisdone [24]

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

4 0
3 years ago
Other questions:
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • An intranet is an external network.TrueFalse
    15·1 answer
  • Discuss two advantages and two disadvantages of agile methods.
    6·1 answer
  • Which character is used to begin a comment?
    6·1 answer
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime n
    14·1 answer
  • Write a brief description of what the local authorities are recommending in the news people should do to protect themselves from
    8·1 answer
  • Each of these is a step in cEach of these is a step in conflict resolution: Evaluate solutions suggested. Define the problem. De
    7·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!