1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
12

"Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media

player.
1. tablet
2. notebook
3. netbook
4. web-based "
Computers and Technology
1 answer:
Elenna [48]3 years ago
5 0

Answer:

Web based

Explanation:

You might be interested in
Looking at the response vehicles (pictured above), explain two options you have in order to abide by the Move Over law,
Nesterboy [21]

Answer: two options I have in order to abide by the move over law is to either move over or slow down. You must move over a lane away from stationary emergency vehicles if it is safe to do so. If it is not safe to do so then the driver must proceed with due caution, with a safe speed for road conditions.Until the driver has passed the emergency vehicle.

Explanation:Let me know if this helped! (:

6 0
3 years ago
Read 2 more answers
Which of the following is NOT one of the responsibilities of the Federal Reserve?
Ilya [14]
To pay are taxes for every one

4 0
4 years ago
Read 2 more answers
Which part(s) of CAIN is realized through the use of message digest functions and hashes?
KonstantinChe [14]

Answer:

Integrity

Explanation:

In CAIN, integrity is realized through the use of message digest functions and hashes.

Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.

The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.

5 0
4 years ago
True or False? A three shot is a series of any three individual<br> camera shots.
castortr0y [4]


True. A three shot is a series of any three individual camera shot ..
3 0
3 years ago
Before a program written in c can be executed on a computer, what step is required to be done first?
sergejj [24]
It should be compiled. It won't work if it's not compiled.
6 0
4 years ago
Other questions:
  • A friend knows I'm taking a technology class in college and asks me how a hard drive works. What should I say to a friend about
    10·1 answer
  • Which statement identifies what the students will be graded on?
    5·2 answers
  • How do you add binary numbers?
    13·2 answers
  • Write a program that, for four points A, B, C and P, which a) Draws a triangle formed by ABC and a small cross showing the posit
    15·1 answer
  • An example of movement as a gameplay mechanic includes
    14·2 answers
  • Create a method to search an un-ordered array of integers for a value, if the value is found return the index of its position in
    10·1 answer
  • Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to
    7·1 answer
  • true or false then EXPLAIN why. Since many forms of money do not earn interest, people's demand for money is unaffected by chang
    14·2 answers
  • When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?
    10·1 answer
  • Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!