1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
4 years ago
7

True/false operating systems of mobile devices can support full-scale software programs like Microsoft word or excel

Computers and Technology
1 answer:
Anestetic [448]4 years ago
7 0
This statement is false.
You might be interested in
What are three methods of sustainable farming and describe each.
Ivan

I will mention the 3 common methods of sustainable farming.

 

<span>1.       </span> Crop rotation: Planting various crops can have a lot of advantages, including healthier soil and improved pest control. Crop rotation avoids the consequences of planting the same crops in the same soil for years in a row.

<span>2.       </span>Cover crops: Cover crops are planted mostly during off-season. They help protect and build soil health by preventing erosion and reducing weeds.

<span>3.       </span>Soil enrichment: Healthy soils are full of life and can increase yields by creating more robust crops.







8 0
4 years ago
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
loris [4]

The place value can be used to convert a binary number, such as 11010010, into decimal form: 11010010 = 1 x 27 + 1 x 26 + 0 x 25 +1 x 24.In light of the aforementioned, the base-4 number system has 4 digits: 0, 1, 2, and 3. Any 2-bit number can be represented by a single base-4 integer since a 2-bit number can only represent one of the values 0, 1, 2, or 3.

<h3>What does base 4 mean?</h3>
  • Base-4 is a quaternary  number system. Any real number is represented by the digits 0, 1, 2, and 3.
  • In light of the aforementioned, the base-4 number system has 4 digits: 0, 1, 2, and 3. Any 2-bit number can be represented by a single base-4 integer since a 2-bit number can only represent one of the values 0, 1, 2, or 3.
  • The four digits of Quaternary (Base 4) are 0 through 3.
  • Binary code 4 is 100. In a binary number system, we only use the digits 0 and 1 to represent a number, as opposed to the decimal number system, which uses the digits 0 to 9. (bits).

To learn more about Quarternary number system refer to:

brainly.com/question/28424526

#SPJ4

7 0
1 year ago
he wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders'
Kamila [148]

Answer:

The wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders' far-reaching trade networks

C preference for local natural resources

Explanation:

The Buk (mask) aged middle to late 19th century C.E., was located in Australia, Mabuiag Island, Queensland, Torres Strait, which is between Australia and Papua New Guinea with many small mostly uninhabited islands around. Archaeological excavations show people´s  arrival at  Mabuiag islands around 7,300 years ago, being very dependent on ocean´s products to survival.

Few surviving pieces, made out of local resources materials such as turtle shell, wood, fiber, cassowary feathers, resin and paint, tell us feathers were a throughoutly artistic material used in Oceania , but  turtle shells masks were Torres Strait´s people hand-crafted and unique hallmark to be used during assorted ceremonies.

7 0
3 years ago
Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
liq [111]

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

  • The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  
  • It is widely used in the data driven applications.
  • The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

5 0
3 years ago
Other questions:
  • Jane works in the sales department of a service company. She has impressive interpersonal skills and always turns up for work on
    11·2 answers
  • What are some examples for Environmental Technology?
    5·2 answers
  • What type of accessory device can be used to measure AC current with a VOM without opening the circuit? A. Split inductor B. Amp
    13·1 answer
  • Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
    10·1 answer
  • Tom installs a Telnet application on his Windows Vista system. When he first starts the program, Windows Firewall pops up with a
    10·1 answer
  • What is entered into a cell that is typically numeric and can be used for calculations?
    9·2 answers
  • Which of the following is not a characteristic of a good value log entry
    15·1 answer
  • What is computer system<br>explain the role of bank in computer<br>​
    15·2 answers
  • What three actions happen when you cloak a folder or file?
    6·1 answer
  • Select a software package/electronic device that you know well. It can be from any domain (work related, entertainment, desktop,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!