1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
9

Free points i got the answer

Computers and Technology
2 answers:
GaryK [48]3 years ago
6 0

Answer:

thanks for the free points

Mashcka [7]3 years ago
5 0

Answer:

Thanks for the free points

Explanation:

You might be interested in
Difference between desktop, web and mobile apps
Lyrx [107]

there are many differences, but the most prominent are that they have different apis (aplication programing interface) and different architecture

also mobile apps tend to use less system resources and are more regulated by services like the google play store, opposed to the fairly unregulated uwp platform used by most windows machines.  


4 0
4 years ago
Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
LenaWriter [7]

Answer:

The processor and the motherboard goes bad.

Explanation:

Computer system component upgrade allows the enhancement of the component specification. Every computer system comes with a specific quality, size or speed of its various components like the storage drives size, the memory size, the processor speed and even the software components like the operating system.

An upgrade must be compatible with the system configuration like upgrading the processor. If the upgrade is compatible, the processor speed can be increased, but when an upgrade of the processor is not compatible with the chipsets, this could damage the processor and motherboard.

3 0
3 years ago
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
Angelina_Jolie [31]
She has the Android operating system if she’s frequently downloading mobile apps from the Amazon App Store as opposed to IOS which is the Apple operating system.
7 0
3 years ago
Cuantos días tiene un año
Arte-miy333 [17]

Answer: 365 dias

Explanation:

4 0
2 years ago
Other questions:
  • A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
    6·1 answer
  • Airbags only absorb the _____ impact in a crash. initial final mid-stage smallest
    13·1 answer
  • Which best explains what a credit score represents
    10·2 answers
  • What are the major differences between searching and sorting in Java? What are some of the differences in the techniques used in
    9·1 answer
  • Audio editing software contains several codecs that allow you to
    15·1 answer
  • What is a music composition copyright?
    8·2 answers
  • The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sid
    8·1 answer
  • How does the technology work
    10·2 answers
  • Which option correctly identifies if the researcher’s approach was the best start in the following scenario and explains why?
    10·2 answers
  • Plz plz plz subsribe to my channel, CookieFunTime
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!