1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
11

Mobile devices need to work within limited screen space .

Computers and Technology
1 answer:
zloy xaker [14]3 years ago
3 0
True. Mobile devices need to work within limited screen space. Mobile devices are designed to be portable and designed to be carried around without hassle. Mobile devices are used for personal activities such as talking privately, chatting and many more that is why it is designed to be small.
You might be interested in
Algorithm to print the first 10 odd numbers​
77julia77 [94]

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

4 0
2 years ago
I want to discard my old computer and want to securely erase the data from my hard drive what is the process called.
laiz [17]
I believe the process is called High Level Format.
8 0
3 years ago
Read 2 more answers
Think of—and explain—one or more ways that society could use big data
Komok [63]

Answer:

Naumann noted there are many positive ways to use big data, including weather prediction, forecasting natural disasters, urban and community planning, traffic management, logistics and machine efficiency, personalized healthcare, customized learning, autonomous vehicles, fraud detention, robotics, translation, smart ...

3 0
2 years ago
What is the computer box called?
BaLLatris [955]
It is called the desktop or case.
7 0
3 years ago
Read 2 more answers
Host computer is:
N76 [4]

Answer:

A

Explanation:

8 0
3 years ago
Other questions:
  • Functions that are built-in into PHP to perform some standard operations.
    15·1 answer
  • each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
    14·1 answer
  • Does anyone know the answers?
    8·1 answer
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • What is the best way to protect against the loss of important files
    15·1 answer
  • For the following C code assume k and m are passed in x3 and x4 respectively, while result is returned in x4. Compile this code
    14·1 answer
  • Define a function typeHistogram that takes an iterator ""it"" (representing a sequence of values of different types) and builds
    12·1 answer
  • What is the index of 7 in this list?
    10·1 answer
  • Explain the integer and float datatypes with example.<br><br>​
    11·1 answer
  • Pls help me computer science discoveries
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!