1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
15

Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for com

municating via texting and connecting to the web.
A. Thumb
B. Traditional
C. Notebook
D. Combination
Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
7 0

Answer:

Option A is the correct answer for the above question.

Explanation:

The keyboard is a device, by which a human can instruct the computer in the text form. There are so many keyboards in which, thumb keyboard is one of them. The thumb keyboard is found in mobile phones, smartphones or PDA phones, which is used for personal use. It is a designed layout of the keyboard that can be placed on the hand of the human and a person can type on its with the help of his thumb.

The above question asked about the type of the keyboard which is used in various smartphones and other phones. That keyboard is thumb keyboard which is described above and it is stated from the option A. So option A is the correct answer while the other is not because--

  • Option B states about the traditional keyboard which is used for the PC only.
  • Option C states about the Notebook keyboard which is used for the Notebook computers only.
  • Option D states about combination which is not a type of keyboard.
You might be interested in
assume that name is a variable of type stirng that has been assigned a value write an expression whose value is the last charact
Snezhnost [94]

Answer:

The most straight forward way to do it: in general string are zero index based array of characters, so you need to get the length of the string, subtract one and that will be the last character, some expressions in concrete languages would be:

In Python:

name = "blair"

name[len(name) - 1]

In JavaScript:

name = "blair"

name[name.length - 1]

In C++:

#include <string>

string name = "blair";

name[name.length() - 1];

7 0
3 years ago
__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and e
Vladimir79 [104]

Answer:

Programmable.

Explanation:

Programmable locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security. This type of lock are operated using a programmable plastic card and are typically smart.

5 0
3 years ago
Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components
Kitty [74]

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

7 0
3 years ago
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply
defon

There is great improvement in technology. Tom should reply that Containers uses Containers use operating system (OS) components for virtualization.

  • That is a kind of operating system (OS) virtualization where leverage features is placed on the host operating system so as to separate or isolate processes and control the processes' access to CPUs, memory and desk space.

Container based virtualization often makes use of the kernel on the host's operating system to run multiple guest instances. By this, one can run multiple guest instances (containers) and each container will have its specific root file system ascribe to it, process and network stack.

Learn more from

brainly.com/question/24865302

6 0
2 years ago
1. Explain what peer to peer networking is.
timurjin [86]
<h3>Peer-to-peer networking</h3>

Peer-to-peer networking is a term used to describe a system of communication that allows a group of computers to exchange information in a permissionless way.

One pro of -peer-to-peer networking is that it decentralizes how information is transferred and secured since files are stored on just a single device.

On the other hand, a con of peer-to-peer networking is the possible exposure to harmful data such as malware. been transferred from another computer.

You can learn more about peer-to-peer networks from a similar question here brainly.com/question/1932654

#SPJ1

3 0
2 years ago
Other questions:
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • Match the personality traits with their description
    9·2 answers
  • 15. Write a program in python to read three numbers in three variables and swap first two variables with the sums of
    8·1 answer
  • My name Jeff <br><br> what movie is this off of
    6·2 answers
  • What does remedy mean
    7·2 answers
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • Complete the add repair method!<br> (Will give the brainiest)
    11·1 answer
  • Define input hardware​
    12·1 answer
  • _____ is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate secu
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!