1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
11

Discuss the pros and cons of tombstoning versus multitasking. Why do you think Microsoft chose tombstoning?

Computers and Technology
1 answer:
finlep [7]3 years ago
6 0

Answer:

Multitasking is the capacity of a computer to manage multiple tasks simultaneously. Tombstoning is being used on Windows mobile but when it is not being used, it is likened with a napping state of an app or program.

Explanation:

Multitasking is the capacity of a computer to manage multiple tasks simultaneously. Tombstoning is being used on Windows mobile but when it is not being used, it is likened with a napping state of an app or program.

The main difference between tombstoning & multitasking is that one uses memory and one doesn't. One of big issues with the Android operating system is that when the client feels they have left the program, apps remain in the background utilizing resources.

Telephones with multitasking abilities use vital resources and have a shorter batter life than telephones without multitasking. This is the major reason why Microsoft is choosing to use tombstoning rather than multi tasking on phones.

You might be interested in
You just read a restaurant review on the internet of the newest restaurant in town. The writer of the article said the food was
Marizza181 [45]
A. The restaurant review contains data but is not data itself. 
I'm sorry if that's wrong, but that seems right to me. 

6 0
3 years ago
Which of the following are characteristics of global variables? Check all that apply.
algol [13]

Answer:

A and D

Explanation:

took the test

7 0
3 years ago
Read 2 more answers
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
qaws [65]

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

3 0
3 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
3 years ago
Read 2 more answers
How does electricity work in phones?
kati45 [8]
Great Question! So the plug will go into the wall and electricity will hit the cord and power through the cord into the charger (Cordless) Now if you talking mobile phones such as iPhones. The battery powers wire and hardware to power your little mobile phone! Hope this helps.
8 0
3 years ago
Other questions:
  • You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What's the mos
    10·1 answer
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • Why are many otherwise safety-conscious people victims of Internet crime?
    13·1 answer
  • Ben assembled parts of a computer and created a fully functional desktop PC. He wants the computer to connect to the Internet. W
    10·1 answer
  • When did gaming become a thing?
    7·2 answers
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • Name the functional arms of MSDE.
    13·1 answer
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • Could u give me brief summary of New Years
    14·2 answers
  • Program a substitution cipher in Python. Create 2 functions one for encryption and the other for decryption ( get the text as th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!