1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
7

What operating system is a smartphone most likely to use? a. bsdb. mac os xc. symbiand. linux

Computers and Technology
1 answer:
Deffense [45]3 years ago
5 0
Linux based operating system is the norm. but android used linux based kernal and so did microsoft on thier phones and so on any low end operating system their based on linux.
Which version of linux?
well their are variety which the dev can choose
You might be interested in
User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all that apply)
Gnesinka [82]

Answer:

A, C, D

Explanation:

User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions.

4 0
3 years ago
Read 2 more answers
When typing lists in a document, you must use single-spacing between each item in the list.
dexar [7]
False False true
Hope it helps
4 0
3 years ago
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
sdas [7]
Least privilege is the data access principle that ensures to unnecessary access to data exists by regulation members so that can perform only minimum data manipulation necessary. The principle of least privilege or as called as POLP is the run-through of controlling access to the minimal level that will permit normal functioning. The norm of least privilege interprets to giving people the lowermost level of user right that they can have and still do their jobs. The principle is also functional to things other than people as well as programs and processes. It is created in the US department of defense in the 1970’s and aimed to limit the potential damage of any security breach either accidental or malicious. 
5 0
3 years ago
Out of a list of the values 8, 3, 30, 5, 15, and 6, what result would the MIN function return?
kondor19780726 [428]
Probably the minimum number in the given set so 5.
6 0
3 years ago
Read 2 more answers
What are the factors affecting the purchasing decision for dbms software?
djverab [1.8K]
T<span>he factors affecting the purchasing decision for dbms software are : 
</span><span>a) Cost
b) DBMS features and tools
c) Underlying model
d) Portability
e) DBMS hardware requirements</span>
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following options would you use when saving a document with a new filename? *
    12·2 answers
  • What is an example of constructive criticism for an employee who is shy during meetings?
    15·2 answers
  • To make sure that you do not get too tired when typing for long periods, how often should you get up and stretch? Every 15 minut
    9·1 answer
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • When did gaming become a thing?
    7·2 answers
  • What does f.i.r.s.t stand for in robotics
    15·1 answer
  • Websites whose URL’s contain tildes (~) are usually published by the government. TRUE or FALSE.
    8·2 answers
  • dr. olson likes to conduct research on the nature of prejudice and its effect on behavior. dr olson is probably a (n) - psycholo
    8·2 answers
  • How do we store value in a variable? Give an example
    15·1 answer
  • What is an issue with using cloud computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!