1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
4 years ago
11

Is apple better than android

Computers and Technology
2 answers:
Oxana [17]4 years ago
5 0
Yes it is, you can do so much more with apple
KatRina [158]4 years ago
3 0

In a sense yes as it has a more user friendly interface but in terms of usability android is a far better os

You might be interested in
Suppose your name was George Gershwin. Write a complete program that would print your last name, followed by a comma, followed b
NNADVOKAT [17]

Answer:

I will write the code in C++ and JAVA      

Explanation:

<h2>JAVA CODE</h2>

public class Main

{ public static void main(String[] args) {

       // displays Gershwin,George

     System.out.println("Gershwin,George"); }  }

<h2>C++ Code:</h2>

#include <iostream>

using namespace std;  

int main()

{  cout<<"Gershwin,George"; }    

// displays last name Gershwin followed by , followed by first name George

//displays Gershwin,George as output.

6 0
4 years ago
Read 2 more answers
Which is a credit card balance A. The amount of interest you must pay the credit card company B. The required minimum payment to
yKpoI14uk [10]
The best answer among the following choices would be the fourth option D).
7 0
3 years ago
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
4 years ago
Why do we use if statements in JavaScript?
alexdok [17]

Answer:

The if statement is used to check a condition

8 0
3 years ago
if you upgrade your memory but notice the RAM count does not reflect the additional memory, what should you do ?
alisha [4.7K]

Try looking at your motherboard manual to see which dimm slots should be used first since putting memory in any slot could break the dual channel. Not giving your motherboard access to that ram. Or you probably used wrong memory since your memory has to be the exact same size and speed and type. Because 8gb ddr3 will not work with 8gb ddr4. 8gb ddr4 2400 MHz will also not work with 8gb ddr4 3200 MHz. And 8gb 3200 Mhz would not work with 16Gb 3200 mhz. Your ram should have the exact same specs.

3 0
4 years ago
Other questions:
  • 2.Write an if /else if statement that carries out the following logic. If the value of variable quantityOnHand is equal to 0, di
    8·1 answer
  • Discuss how the use of standard web component layouts and templates influences the visual design of a web page. In your opinion,
    9·1 answer
  • (True/False) Utilizing a higher bandwidth can support a larger volume of data (in bits per second) to be transmitted than a lowe
    13·2 answers
  • Technology will not? A. change the way work is done B. process information faster C. slow the pace of work D. link companies and
    8·1 answer
  • Select the guidelines you should follow when creating a resume
    12·2 answers
  • Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
    6·1 answer
  • What does the /var directory contain?
    7·1 answer
  • How is “compromise" defined in the context of information technology and Select one answer.
    5·2 answers
  • I need help! Please please
    14·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!