1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
6

A notebook computer usually is more expensive than a desktop computer with the same capabilities because it ____.

Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
6 0
Because it is more portable.
You might be interested in
In a five-choice multiple-choice test, which letter is most often the correct
tatiyna

I believe the answer is C.

5 0
3 years ago
Read 2 more answers
How can edge computing be used to increase sustainability
nika2105 [10]

Edge computing be used to increase sustainability With Edge Computing the number of records traversing the network can be reduced greatly, freeing up bandwidth.

<h3>How is part computing sustainable?</h3>

Data centers devour an expected 2 hundred terawatt-hours (TWh) of power every year–extra than the power intake of a few countries. They additionally produce an expected 2% of all worldwide CO2 emissions. Edge Computing reduces network site visitors and records centre usage.

Data centres devour an expected 200 terawatt-hours (TWh) of power every year–extra than the power intake of a few countries. They additionally produce an expected 2% of all worldwide CO2 emissions.

Read more about the sustainability:

brainly.com/question/25350238

#SPJ1

4 0
2 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
3 years ago
Due to a fire at ABC Software Solutions, all
zaharov [31]

Answer:

chaos among people who worked in the company.

6 0
1 year ago
Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each
mina [271]
Ok chapter 2 be done by 11:59
5 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • Assume the existence of a Bank Account class. Define a subclass, Savings Account that contains the following: a double instance
    5·1 answer
  • ICS facilitates the ability to communicate by using:
    7·1 answer
  • Edhesive coding practice 3.4​
    13·2 answers
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·1 answer
  • Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
    11·1 answer
  • Examples of analog computer
    8·1 answer
  • You have imported a library with the birthMonth() function. Based on the API, how many strings are inputed to calculate the birt
    11·1 answer
  • How do you copy a file​
    9·1 answer
  • Budgeting for a Computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!