1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
4 years ago
11

How much memory did the first smartphone have?

Computers and Technology
1 answer:
hjlf4 years ago
6 0

Memory 1 MB (2 × HM658512LTT PSRAM)

Storage 1 MB of NOR Flash expanded to 2 MB by Stacker compression + 32KB BIOS NOR Flash

You might be interested in
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
Why does space exploration lead to new technology?
valentina_108 [34]

Answer:

C. Because materials developed for use in space are often useful to ordinary citizens.

Explanation:

A, is not correct due to the "only" word. Humans can explore space too.

B, not that either because you will need lots of technology to space travel, not less.

C, because materials that can be produced through scientists' ideas can help contribute to society and improve technology.

D, is not correct because there is no need for new materials for new technology.

5 0
3 years ago
Writeing an emeil in this senerio
ozzi

Dear, ____

Hi! I will be explaining all the questions you want answered! I will be visiting for every ___ hours. I will be providing to walk, feed, give essential playtime. and comfort for your pet. I will be also making sure everything is fine while i pet sit them. You can easily pay me cash when you get back, and that will be fine by me! I hope you have fun and know that your pet will be in great care!

sincerely,

_____

3 0
3 years ago
why does this site force you to make an account to get literally anything at all i want to pass the 9th grade not watch 5 ads pe
cricket20 [7]

Answer:

They do anything for money sis

Explanation:

4 0
4 years ago
Other questions:
  • The sheets that supply the data in a summary sheet are called the
    10·1 answer
  • When encountering another vessel in darkness or reduced visibility, what do visible red and green lights indicate
    9·1 answer
  • Discuss how advertising on the Web affects search results and the ethical dilemmas associated with it.
    5·1 answer
  • Answer the following
    11·1 answer
  • Should you configure if you want to limit access to files with certain classifications within a folder to a specific security gr
    13·1 answer
  • _____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day
    14·1 answer
  • describe what measures should have been taken by the educational service and test preparation provider to avoid the security bre
    11·1 answer
  • Please help me with this
    6·1 answer
  • When creating a storyboard, in which section do you mention how you move from one shot to the next?
    8·1 answer
  • Select L for the items that refer to General Lee, H for General Halleck, and M for General McClellan.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!