1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
14

A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a

_______.
Computers and Technology
1 answer:
bekas [8.4K]3 years ago
7 0

I guess the answer in the blank is Tablet.

A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a tablet.

You might be interested in
Write a simple hello world program in python 3
IRINA_888 [86]

Answer:

print("hello world")

Explanation:

a hello world program is simply a program that prints out hello world.

for this you would need to remember to have the same number of brackets on each side and to write print. Also remember when printing to include speech marks.

6 0
3 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
Artyom0805 [142]
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

4 0
4 years ago
Read 2 more answers
What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
Ugo [173]

Answer:

D. Binary

Explanation:

Computer hardware parts are built on transistors, small electrical devices that switch electrical signals and amplify power. The CPU (Central Processing Unit), the "brain" of the computer, has billions of tiny transistors <em>alone</em>.

These transistors read binary, a code made up of 1's and 0's. This code tells what the computer to do.

CSS, HTML, and HTML 5 apply to web pages and web page designs, not code for the computer.

The OS (operating system) that your computer runs is coded in C++ (Windows) or C (Linux)

4 0
3 years ago
قواعد البيانات الموزعه​
Monica [59]

Answer:

Translation : Distributed Databases

Explanation:

6 0
4 years ago
Other questions:
  • Write a program for any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed b
    6·1 answer
  • The next page and previous page buttons allow you to navigate through a worksheet while in print preview mode.
    6·1 answer
  • Which of the following does not illustrate the survey method of choosing a speech topic?
    6·2 answers
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • Explain by details operator overloading in C++ with example
    6·1 answer
  • What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
    11·1 answer
  • Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and
    12·1 answer
  • Hi<br>is it right?<br>"I think there is a small mistake in the quotation(second not first)"​
    5·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!