1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo

rd do you want to see in the specs? question 18 options: backward compatible integrated multifunctional bluetooth-enabled
Computers and Technology
1 answer:
andrezito [222]3 years ago
8 0
I would want to see the word compatible in the specs
You might be interested in
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Which of the following is true of a traditional systems development environment?​ a. ​ Systems are developed and delivered in an
pshichka [43]

Answer:

c. ​ Many applications require substantial desktop computing power and resources.

Explanation:

From the options given, the correct answer is C.

Traditional system development is the development of computer software for a typical computer system.

The other options is true for web based system development environment.

Option A mention web based framework as traditional development environment and this is not correct.

Option B mention scalability and running on multiple hardware. This is not true for traditional development environment as it is not scalable and it doesn't run on multiple hardware concurrently. So B is not correct.

Option C is correct as Many applications require substantial desktop computing power and resources.

Option D is not correct as traditional system development environment is not the platform for internet based development. Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel.

6 0
3 years ago
Describe one health problem related to fertilizers?​
gladu [14]
The Answer is look it up
7 0
3 years ago
consider Java and explore its scope rules. One aspect of the scope rules of any language is when data or methods can have the sa
navik [9.2K]

Answer and Explanation:

Abstract class Point {

   int x = 1, y = 1;

   void move(int dx, int dy) {

       x += dx;

       y += dy;

       alert();

   }

   abstract void alert();

}

abstract class Colored Point extends Point {

   int color;

}

class Simple Point extends Point {

   void alert() { }

}

Here, a class Point is proclaimed that must be declared abstract, in light of the fact that it contains an assertion of a unique strategy named alert. The subclass of Point named Colored Point acquires the dynamic technique alert, so it should likewise be proclaimed theoretical. Then again, the subclass of Point named Simple Point gives a usage of alarm, so it need not be dynamic.

The statement:

Point p = new Point();

would bring about an aggregate time mistake; the class Point can't be launched in light of the fact that it is theoretical. Be that as it may, a Point variable could accurately be instated with a reference to any subclass of Point, and the class Simple Point isn't digest, so the statement:

Point p = new Simple Point();

would be correct. Instantiation of a Simple Point causes the default constructor and field initializers for x and y of Point to be executed.

5 0
3 years ago
What is the term that is used to describe a computer system that could store literary documents, link them according to logical
madreJ [45]

Answer:

hypertext

Explanation:

Based on the information provided within the question it can be said that the type of computer system function being described is known as hypertext. This displays text to the computer display that references other literary documents for immediate access to them. These are documents with a specific relation to the text that is being displayed and also allows readers to comment and annotate what they read on the documents.

5 0
3 years ago
Other questions:
  • Why was unicode invented
    11·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
    7·1 answer
  • In Joan Woodward's study of the relationship between technology and structure, the structure that was the most technically compl
    6·1 answer
  • Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
    14·2 answers
  • Casey, a woodworker, is developing his own website. He plans to use the site as a means of selling his handmade furniture. While
    10·1 answer
  • Assume you are given three variables, revenue, expenses, and profit, all of type Money (a structured type with two int fields, d
    10·1 answer
  • In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
    10·1 answer
  • What color mode would you use when designing for web & devices?
    9·1 answer
  • Lesson 2.7 Code Practice #2
    13·1 answer
  • What are the advantage of an e-library​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!