1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
11

Your sister is considering purchasing a tablet computer that utilizes RT as the

Computers and Technology
1 answer:
Masja [62]3 years ago
3 0
You would tell her that she wouldn’t be able to install regular Windows applications on Windows RT (Answer D). RT is only able to install applications from Windows Store and/or has limited installation sources allowed to use unlike regular Windows 8 where you are able to install apps from whichever developer and website you wish.
You might be interested in
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
Rate my dog out of ten give explanation why
Karolina [17]

Answer:

10/10

Explanation:

i love dogs. he's a super cute dog and i love him without even knowing him

7 0
3 years ago
A data use agreement is required when a researcher uses a limited data set (lds). an lds must have:_________
svetoff [14.1K]

An LDS must have all direct identifiers removed.

According to the HIPPA policy, a Limited Data Set (LDS) is a kind of data set in which direct identifiers are removed.

Limited Data Set  (LDS) is a set of data that can be used for research purposes under the HIPPA policy without any authorization from the patient. However, this kind of data ensures that any kind of identifier information such as the patient's name, relative's name, address, number etc is not shared and not made a part of the research.

Limited Data Set (LDS) shows common information like age, city, and gender information from the data.

The Limited Data Set (LDS) is available to only those researchers with whom the data use agreement has been signed.

To learn more about  Limited Data Set (LDS), click here:

brainly.com/question/2569524

#SPJ4

7 0
1 year ago
The basic components of cartridges and shotshells are similar. Shot pellets and a bullet are examples of which basic component?
Liono4ka [1.6K]
The answer is projectile. Handguns and rifles use a cartridge having a single projectile or bullet. Shotguns use a shot shell comprising either a single bullet or a big number of small projectiles (shot or pellets). Though, the basic components of cartridges and shot shells are alike.
5 0
3 years ago
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
FinnZ [79.3K]

<u>Explanation</u>:

It is an all-too-often used technology today in connecting several computers together via a network.

Routing simple terms means the action of selecting the path taken by the traffic of data in a network of computers. The routing systems involve the use of both wireless and cable based architectures. Some common example of routing systems includes:

  1. Dynamic Routing
  2. Static routing
  3. Default Routing
5 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • Explain how to use fortran programming in details
    14·1 answer
  • Which part of the faucet is the aerator?
    13·1 answer
  • A high-angle shot is the same thing as a bird’s-eye shot. True False
    11·2 answers
  • Select the statement that accurately describes why the Italics function is being used in the sentences below.
    8·1 answer
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    5·1 answer
  • Is it possible to make teleportation with a fusion device
    15·1 answer
  • _________________________ are the countable products resulting from a program, while ________________________ are the changes in
    9·1 answer
  • Write modified code that will generate a random number between 0 and 255 when a button is pressed and will write the number to t
    14·1 answer
  • Synthesize (15 points)
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!