1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
10

Which phone has the most GB (Gigo Bites)A.SamsungB.IphoneC.LGD.ZTE

Computers and Technology
2 answers:
frozen [14]3 years ago
8 0
All phones manufactured by their companies do have different storage capabilities (assuming you are talking about actual phone storage). So Samsung phones could have higher or less GBs per phone than Apple for example. However, all phones are manufactured according the a standard base of 2; i.e. You can only get phones in the following storage sizes: 2,4,8,16,32,64,128 etc.
Lina20 [59]3 years ago
7 0
It's GigaBytes actually. And is it RAM or storage capabilities?

And also those are brands. Not models. For example, Samsung has different phones. Not just one.


You might be interested in
How is kerning used in Word?
kirill115 [55]

Answer: To adjust the spacing between characters that make up a word

Explanation: Kerning refers to the way spacing between two specific characters is adjusted. The idea is to give a better looking result by reducing the spacing between characters that fit together nicely (such as "A" and "V") and increasing the spacing between characters that don't. Select the text that you want to change.

4 0
2 years ago
Whoever helps me with these questions i will help them with the same number of questions in any subject: 1. As the operations ma
mezya [45]
I'm going have to go with with 1.b and 2.d hope this helps and I don't need help right now.
6 0
3 years ago
A hardware supplier manufactures three kinds of​ clamps, types​ A, B, and C. Production restrictions force it to make 10 more ty
Rufina [12.5K]

Answer:

A = 120

B = 40

C = 70

Solution:

As per the question:

Manufacturer forced to make 10 more type C clamps than the total of A and b:

10 + A + B = C                (1)

Also, 3 times as many type B as type A clamps are:

A = 3B                             (2)

The total no. of clamps produced per day:

A + B + C  = 330              (3)

The no. of each type manufactured per day:

Now, from eqn (1), and (3):

A + B + 10 + A + B = 330

2A + 2B = 320

A + B = 160                       (4)

Now, from eqn (2) and (4):

3B + B = 160

B = 40

Since, A = 3B

A = 3\times 40

A = 120          

Put the values of A and C in eqn (3):

120 + 40 + C = 330

C = 70

4 0
3 years ago
Select the correct answer. Trackers are associated with which audio format?
KonstantinChe [14]
MP3 and FMsynthesid
7 0
3 years ago
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
zalisa [80]

Answer:

A

Explanation:

The internet protocols are changed every year to adapt to the new devices that have been connected to the network. Back in the 1990s, most traffic used a few protocols.  Pv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

For many years, there were negligible changes to these core Internet protocols; HTTP added a few new headers and methods, TLS slowly went through minor revisions, TCP adapted congestion control, and DNS introduced features like DNSSEC. The protocols themselves looked about the same ‘on the wire’ for a very long time (excepting IPv6, which already gets its fair amount of attention in the network operator community.)

As a result, network operators, vendors, and policymakers that want to understand (and sometimes, control) the Internet have adopted a number of practices based upon these protocols’ wire ‘footprint’ — whether intended to debug issues, improve quality of service, or impose policy.

Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to those who have taken liberties with undocumented aspects of protocols or made an assumption that things won’t change.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the purpose of this diamond shape in a flowchart?
    8·1 answer
  • what is the software that controls the storage, retrieval and manipulation of database stored in a database
    14·1 answer
  • What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr
    5·1 answer
  • Suppose we eliminate tcp and instead rely exclusively on udp as our only transport layer protocol. ⢠how does this impact opera
    15·1 answer
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
    10·1 answer
  • Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
    15·1 answer
  • How does communication produce clarity and direction​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!