1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
13

Types of computer that we use in our daily life​

Computers and Technology
2 answers:
Valentin [98]3 years ago
7 0
The answer would be all computers
Hope this helps :)
ozzi3 years ago
5 0

Answer:

all coumputers

Explanation:

i just like coumputers

You might be interested in
Supporting mobility and smartphone apps is important to MasterCard. What challenges does MasterCard face in rolling out smartpho
motikmotik

Answer:

Throughout the clarification portion below, the definition of the concern is mentioned.

Explanation:

  • Security

The best characteristic that arrives in and out of mind when people think concerning mobile payments would be security. The greater problem for customers and suppliers is this. As mobile purchases are made, suppliers store card information for potential purchases. Anyway, several vendors note that the data would not be kept on either the service side, however people are rather fearful of sending details.

  • Technology

Some people seem to agree that there's been a significant change in technology in recent years. Especially if we get to see that the frequency of internet access also isn't up to standards in most countries. And in some countries, the network is unavailable and will not link.

  • Different mobile platforms

The very next thing that needs to be confronted seems to be the multiple platforms crisis. Mobile now has multiple systems and apps that a company produces towards one platform simply doesn't work on yet another platform. Platforms including Android exist.

  • Fewer users

That very many consumers are accustomed to the current payment service, such as currency, credit card, debit card, pockets including a few others. Because they do not believe them, they weren't in a condition to introduce a different payment system. This has become one of the smartphone transaction system's obstacles.

  • Required incentives

Incentives are offered whenever the purchase is done by cards or wallets, but they are not accessible when another payment has been made via the billing system for smartphones. To draw more customers, they can do good promotions.

  • Tedious circulate of payments and incoherent consumer experience

The payment water flowing through several iterations through both the smartphone financial services for compensation. Although if we take into account the payment movement of cards, it is very straightforward. Some manufacturers have now launched embedded chips that are safer than magnet circuits. The transaction seems to be much better on these chips, and performance is instantaneous and smooth.

7 0
3 years ago
Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
meriva
Netiquette is etiquette when using the internet. The first guideline refers to posts on social media. Individuals should be mindful that posts can be read by anyone including employers and family members. Individuals need to ensure that material shared is not offensive. The next guideline refers to materials or content that is posted. Users must ensure that material posted does not belong to someone else or is copyrighted. Permission must be sought the owner must be cited or recognized. 
7 0
3 years ago
Read 2 more answers
Yet another variation: A better packet switched network employs the concept of acknowledgment. When the end user’s device receiv
dlinn [17]

Answer:

a. see explaination

b. 0.632

Explanation:

Packet switching is a method of grouping data that is transmitted over a digital network into packets. Packets are made of a header and a payload.

See attachment for the step by step solution of the given problem.

7 0
3 years ago
What is the utility of a lever?
Kamila [148]
Muy cosas.
 fazer una montanha russa andar,ativar una armadilha, ativar una puerta etc.
3 0
3 years ago
Read 2 more answers
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
Other questions:
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • Each professional association has
    7·1 answer
  • Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a
    13·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a
    6·1 answer
  • Use the drop-down menus to complete the statements about changing mail options in Outlook.
    10·1 answer
  • Which background-repeat value represents this div?
    6·1 answer
  • Ok so I’m using a word document and towards the bottom of the page it stops me from moving my text box any further down even tho
    13·2 answers
  • write an algorithm to settle the following question: a bank account starts out with $10,000. interest is compounded monthly at 6
    9·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!