1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
6

What are smart mobile devices?

Computers and Technology
2 answers:
Mashutka [201]3 years ago
7 0
Do you mean like a phone

IPhones
Samsung
Moto z
Lge sorry if this isn't what you asked
miss Akunina [59]3 years ago
4 0
Phone, laptop, tablet
You might be interested in
For this project, you have to write 3 functions. C++
JulsSmile [24]

Find the given attachments

4 0
4 years ago
kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's
soldier1979 [14.2K]

Answer:

web browser

Explanation:

A web browser is a program that allows users to view and explore

information on the World Wide Web.

8 0
3 years ago
Read 2 more answers
you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
kipiarov [429]
Brainstorming, Rationalizing, and Rough Drafts.
8 0
3 years ago
Keyshia wants to add movement to her PowerPoint presentation. Which tab should she use to complete this task
jolli1 [7]

Answer: I belive transitions

Explanation:

6 0
3 years ago
Read 2 more answers
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • Unlike a virtual image, a real image
    7·1 answer
  • Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
    9·2 answers
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • When choosing a new computer to buy, you need to be aware of what operating _____ a0 it uses.
    6·1 answer
  • A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a
    13·1 answer
  • How would I copy this image?
    5·1 answer
  • Name 3 supercomputers along with their cost, purpose and the country it is located.​
    15·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!