1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
15

Which is usually the smallest computer?

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0
I would have to say it would be a PDA, because they generally arent much bigger than a cell phone. at least mine is pretty small anyway. there are certain brands that make larger ones almost the size of a tablet, but in general terms, PDAs are usually pretty small. hope this helps.
You might be interested in
Who are all the fnaf characters?
vitfil [10]

Answer: Freddy Bonnie Chica Foxy Golden Freddy Endo 01 Toy Freddy Toy Bonnie Toy Chica Mangle Balloon Boy Marionette Withered Freddy Withered Bonnie Withered Chica Withered Foxy Withered Golden Freddy Shadow Freddy Shadow Bonnie Endo 02 JJ Phantom Freddy Phantom Balloon Boy Phantom Chica Phantom Foxy Phantom Mangle Phantom Puppet SpringTrap Nightmare Freddy Nightmare Bonnie Nightmare Chica Nightmare Foxy Nightmare Balloon Boy Nightmarionette Nightmare Nightmare FredBear Nightmare JJ Plushtrap.




Explanation: I can only tell you fnaf 1, fnaf 2, fnaf 3, fnaf 4

8 0
2 years ago
Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
Harrizon [31]

Answer:

See explanation

Explanation:

An Integrated software package is a kind of software package that combines various applications in just one program. It basically provides one spreadsheet, one word processing and database management. A good example is the Microsoft Office.

A custom written software package on the other hand is the type that is specially created for a particular business. It is created to meet the client's specifications and preferences.

An advantage of using integrated software is the low cost and fast deployment. Integrated software packages are relatively affordable and easy to acquire unlike that custom based ones that take time to create.

A disadvantage of the integrated software is the lack of control and flexibility. Because it is an integrated software package, you have no control over how it is built and on the long run their updates may not be what you want. And unlike the Custom written one, you cannot tell the developers to add or remove features that suit your needs.

7 0
3 years ago
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
jek_recluse [69]

Answer:

Port 443

Explanation:

This is the Hypertext Transfer Protocol Secure that combines the HTTP with a cryptographic protocol, which can be used for payment transactions and other secure transmission of data from Web pages. Whenever you connect to a website beginning with "https://" or you see the lock icon, you’re connecting to that web server over port 443.

4 0
3 years ago
How are Action Buttons different than hyperlinks?
ipn [44]

Actions buttons are different than hyperlinks in many ways.

2)They are predefined shapes.

<u>Explanation:</u>

Action buttons are predefined shapes in the PowerPoint and can be used for moving between the slides of the presentation and for referring to the hyperlinks as well.

Action buttons have a predefined shape and that shape can be used to set the functionality of that particular button as a convention. Action buttons make up a strong presentation.

Action buttons can be invoked by clicking on them or just hovering over them and various sound effects can also be added on both the events to make the presentation more engaging and attractive.

8 0
3 years ago
Writing anything that comes to mind that may relate to your personal essay is called:
sammy [17]
My life career in computer science
7 0
4 years ago
Read 2 more answers
Other questions:
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • What food does swiss eat on christmas?
    10·1 answer
  • This problem has been solved!
    8·1 answer
  • Should a waiting thread receive priority over a thread first attempting to enter a monitor? What priority scheme, if any, should
    9·1 answer
  • Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new ar
    5·1 answer
  • What are the physical aspect of a presentation​
    7·1 answer
  • What will result if the following code is used in an HTML file? New Title
    13·2 answers
  • How do I create a powershell script to make a Windows user account that is a non-admin user
    7·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!