1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
13

____ is a linux-based operating system developed by the open handset alliance.

Computers and Technology
1 answer:
Misha Larkins [42]3 years ago
6 0
The answer is Android
You might be interested in
You must have an active ____ to test external links.
charle [14.2K]
Network & internet connection
4 0
4 years ago
Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
Fynjy0 [20]

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

3 0
3 years ago
Halp Computer Science
AleksandrR [38]

1st one: is memory

2nd one: is 8

8 0
3 years ago
Read 2 more answers
Why is the yellow light blinking on the front of my computer
Yanka [14]

Answer:

that means it needs to get charged or it's on airplane mode not sure what else it could be

6 0
3 years ago
What are the network topologies? Advantages and disadvantages.
s344n2d4d5 [400]
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.

Advantages:

It is easy to handle and implement.

It is best suited for small networks.

Disadvantages:

The cable length is limited. This limits the number of stations that can be connected.

This network topology can perform well only for a limited number of nodes.
6 0
3 years ago
Other questions:
  • ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
    10·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Which data type is most suitable for a password field
    12·1 answer
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • A. Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter an hourly pay rate and
    8·1 answer
  • Complete the following conversions. You MUST show all of your work to receive full credit.
    13·1 answer
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
    15·2 answers
  • Name 10 songs of POP SMOKE
    13·1 answer
  • 40 points for this question
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!