1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
7

What technology does a smart phone use, and how does it work? ​

Computers and Technology
1 answer:
mixas84 [53]3 years ago
6 0

<em>The smartphone is using several technologies. Such technologies include: </em>

<em>1. Artificial Intelligence</em><em> - this is the type of technology wherein gadgets can talk to you and provide you information when you communicate to them. Communicate means you give gesture to the device or you talk to the device. AI software normally has names depending on the hardware/ brand you are using. </em>

<em>2. Mobile device that can paired and sync with wearable devices - </em><em>Sync is a process of saved information in the cloud can be accessed to multiple devices that has the same credentials to all your devices. These changes and data can also be saved on your wearable devices like smart watches. Smart watches can be paired and used with smartphones. Data in your watch can be seen in phones and vice versa. You can even see what music or movies are playing in your phones using your watch. You can send text message and accept phones using your watch. </em>

<em>3. Virtual Reality - </em><em>you can play and experience Virtual Reality games on your mobile. You can even watch Virtual Reality movies on it. You just have to buy a device that plays or support Virtual Reality apps and movies to complete the experience. </em>

<em> </em>

<em> </em>

<em />

You might be interested in
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
Jeremy has created a snippet of JavaScript. Which event handlers will he use to invoke JavaScript from his HTML form?
riadik2000 [5.3K]

Answer:

One of them is OnClick, but there are more.

Explanation:

I took my post test and only clicked OnClick and I missed this one and it says "not all correct answers chosen"

3 0
3 years ago
Read 2 more answers
Funny or fascinating web content is said to go _________ when it is shared and re-shared a large number of times over a short pe
beks73 [17]
It is said to go viral?
4 0
4 years ago
Pls can anyone be so kind and answer this question.....i need the answer urgently
mixas84 [53]

Answer:

so u have to be smaet

Explanation:

8 0
3 years ago
Please help add header file
Elden [556K]

Answer:

jhgfycgxbhyjuufdxxcgbhjkml;,,,,,,,,,,,,,dfxcg,m .u9cgfbv nmkojihuygfc bvnjmkouhytfgvhbjfjfhngouuhjfcjbhbgfbjghbhjigjkijfbjfjigfijgfg

Explanation:

6 0
3 years ago
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • What's a qat on a computer
    12·2 answers
  • Which of these graphic elements combine text, illustrations, and color?
    14·2 answers
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • 3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
    12·1 answer
  • A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there
    15·2 answers
  • Complete the method, print Multiples(), that takes in a positive integer n, and another positive integer, max. Print out all the
    15·1 answer
  • A prefab allows you to reuse game objects over and over, while their component data remains intact. (1 point)
    14·1 answer
  • Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exc
    6·1 answer
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!