1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
15

Today, most notebook and netbook computers use ____ to give them additional capabilities

Computers and Technology
1 answer:
amid [387]3 years ago
7 0
Relating to the their size is the hard drive.
You might be interested in
Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
zimovet [89]

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

5 0
3 years ago
which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
Wittaler [7]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Does the brain play a role in smartphone addiction
Fynjy0 [20]
Attractive Google search and browse website . playing video games smartphone addiction
7 0
3 years ago
Read 2 more answers
We have written a method called sum with an int[] parameter nums. We want our sum method to compute the sum of nums, but our cod
ira [324]

Answer:

Following are the code to this question:

public class Main//defining a class-main  

{

public static int sum(int[] nums)//defining a method sum that accepts array  

{

int total = 0;//defining integer variable total

for(int num : nums) // use for-each loop

{  

total += num;//add array value in total variable

}

return total;//use return keyword to return the total value

}

public static void main(String []ar )//defining a main method  

{

int[] nums={1,2,3,4,5};//defining 1-D array nums

System.out.println(sum(nums));//use print function to call sum method  

}

}

Output:

15

Explanation:

In the class "Main", a static method, "sum" is defined, that accepts array in its parameter and inside the method, an integer variable "total" is define, that uses the for each loop to add array value in a total variable and use a return keyword to return its value.  

Inside the main method, an integer array nums are defined, that holds store some values and use the print function to call the sum method.

8 0
3 years ago
Draw the gates required to build a half adder.
Svetach [21]

Answer:

The gates required to build a half adder are :

  1. AND Gate for Carry.
  2. XOR Gate for Sum

Explanation:

AND Gate is required for the carry and the XOR gate is required for the sum.

The figures for the gates and the truth tables for the half adder are attached so please refer them for further explanation.

The sum is 1 when one of the input is High or 1 if both the inputs are same then the sum is 0.So this behavior is implemented by X-OR gate.

The carry is High only when both of the inputs are 1.This is implemented by AND-Gate.

6 0
3 years ago
Other questions:
  • A ________ is a small text file passed to a web browser on a user's computer by a web server.
    7·1 answer
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • While editing a film, a director feels that the actors have not enacted a particular scene well. What type of shot must the dire
    12·1 answer
  • The ___________________ command is used to establish connectivity.
    14·1 answer
  • python Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value i
    7·1 answer
  • Does Brainly have tutors?
    11·1 answer
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • Write a program that gets a list of integers from a user. First, the user should be asked to enter the number of integers to be
    5·1 answer
  • If you need to change the typeface of a document, which menu will you choose?
    6·1 answer
  • General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another na
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!