1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
8

What is the computer that is similar to a destop but smaller in size

Computers and Technology
1 answer:
stich3 [128]3 years ago
6 0

Answer:

Laptop

Explanation:

It's literally just a more portal version of a desktop computer.

You might be interested in
Which of these factors needs to be considered when filming in HD?
mihalych1998 [28]

Answer:

I'm going to go with b but there's a 25% thats wrong.

3 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
arlik [135]

Smart devices is a technology trend, interest in renewable energy is a social trend, and buying solar panels and generators is a consumer trend.

4 0
3 years ago
Read 2 more answers
How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust o
andreev551 [17]

The correct answer to this open question is the following.

The regulation of security and trustworthiness on the Internet is likely to develop into more security practices that can guarantee people, the investors, the common citizen, that their information, transactions, and private life are protected. The government has to play a big and key role in demanding companies to install the proper security protocols in their systems in order to protect the information of their clients. Definitely, now more than ever, cybersecurity is a major concern for everybody.

The private sector must improve trust online. Indeed, CEOs of major companies such as Faceb*ok had been questioned by members of US Congress regarding the way they handle private data and they also have questioned that social media site in the long-questioned Russian intervention in the 2016 US elections. Without a doubt, governments have to step in more to have the proper legislation that enforces companies the correct handling of personal data. The public's confidence on the Internet has declined and they are looking for answers in different types of alternatives, including other infrastructures because they are afraid that their personal information could be in hands of people that have different intentions than the simple trade interaction.

6 0
3 years ago
Which components of the​ five-component model is commonly thought of as the​ "bridge" that links the computer side of the model
-Dominant- [34]

Answer:

The correct answer to the following question will be "Data".

Explanation:

  • Data would be any series of one or even more signs which are given significance by unique classification action. To become knowledge the data needs to be interpreted.
  • Data is generally considered to be the "bridge" that connects the designer's machine part with the practical side.

Therefore, this will be the right answer.

3 0
3 years ago
a uniform density sheet of metal is cut into a shape of an isosceles triangle, which is oriented with the base at the bottom and
Cloud [144]

The horizontal center of mass will be located at the horizontal center of mass will be located on the center line. This is further explained below.

<h3>What is Location?</h3>

Generally, a location or place that is inhabited, open for occupation or distinguished by some distinctive feature: situation The setting of the property contributes significantly to its overall allure.

In conclusion, The center line will serve as the location for the horizontal center of mass, which will be found at the same location as the center line.

Read more about Location

brainly.com/question/11718756

#SPJ1

6 0
2 years ago
Other questions:
  • In Excel, an anchor($) allows you to:
    7·2 answers
  • During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
    6·1 answer
  • Nvm, Its B.
    10·1 answer
  • a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whol
    10·1 answer
  • During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
    9·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • Help meeee if you want to please thank you have a good day
    5·2 answers
  • To calculate perimeter of a rectangle​
    9·2 answers
  • (Please hurry will give brainliest and anything else please Due in 5 min)
    9·2 answers
  • Explain the effects of disposing electronic equipments to the environment ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!