1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
3 years ago
14

How does different mobile application affects the life of every individual? Explain your answer in 3-5 sentence.​

Computers and Technology
1 answer:
fenix001 [56]3 years ago
3 0

Answer:

  1. New technologies available with cellular devices and the introduction of smartphones have become a large part of individual’s lives in the past few decades.  
  2. Smartphones have the ability to perform almost every operation necessary for individuals at any time or place. Smartphones are means for individuals to communicate quickly while interacting on other websites and social networking platforms at the same time.  
  3. Each day the capabilities of smartphones continue to grow and allow users to establish more information through these mediums, without the extra work of using other devices and programs.  
  4. The individuals in the 18-30 age range are the ones most affected in their social interactions because of the reliance on smartphones. These younger individuals use the smartphones as their main form of communication.
You might be interested in
You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. Wh
DedPeter [7]

Answer:

A. PAT.

Explanation:

Based on the detail given the technology I will

basically use to help implement the solution will be PAT which full meaning is PORT ADDRESS TRANSLATION reason been that PAT is a technology that enables multiple users to have access to the internet and secondly PORT ADDRESS TRANSLATION (PAT) can often share one IP public address to multiple or different internet users at a time.

8 0
3 years ago
Rene has added to touches and shoulder stretches to his warm up routine these activities are most likely to improve his
pochemuha
Arm rotations is the answer I think
6 0
3 years ago
9. The monumental failure of Atari's E.T Extra-terrestrial was, among other things, due to the fact that ______________
nlexa [21]

Answer:

c

Explanation:

5 0
3 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit,
Inga [223]

Answer:

In terms of efficient use of memory: Best-fit is the best (it still have a free memory space of 777KB and all process is completely assigned) followed by First-fit (which have free space of 777KB but available in smaller partition) and then worst-fit (which have free space of 1152KB but a process cannot be assigned). See the detail in the explanation section.

Explanation:

We have six free memory partition: 300KB (F1), 600KB (F2), 350KB (F3), 200KB (F4), 750KB (F5) and 125KB (F6) (in order).

Using First-fit

First-fit means you assign the first available memory that can fit a process to it.

  • 115KB will fit into the first partition. So, F1 will have a remaining free space of 185KB (300 - 115).
  • 500KB will fit into the second partition. So, F2 will have a remaining free space of  100KB (600 - 500)
  • 358KB will fit into the fifth partition. So, F5 will have a remaining free space of 392KB (750 - 358)
  • 200KB will fit into the third partition. So, F3 will have a remaining free space of 150KB (350 -200)
  • 375KB will fit into the remaining partition of F5. So, F5 will a remaining free space of 17KB (392 - 375)

Using Best-fit

Best-fit means you assign the best memory available that can fit a process to the process.

  • 115KB will best fit into the last partition (F6). So, F6 will now have a free remaining space of 10KB (125 - 115)
  • 500KB will best fit into second partition. So, F2 will now have a free remaining space of 100KB (600 - 500)
  • 358KB will best fit into the fifth partition. So, F5 will now have a free remaining space of 392KB (750 - 358)
  • 200KB will best fit into the fourth partition and it will occupy the entire space with no remaining space (200 - 200 = 0)
  • 375KB will best fit into the remaining space of the fifth partition. So, F5 will now have a free space of 17KB (392 - 375)

Using Worst-fit

Worst-fit means that you assign the largest available memory space to a process.

  • 115KB will be fitted into the fifth partition. So, F5 will now have a free remaining space of 635KB (750 - 115)
  • 500KB will be fitted also into the remaining space of the fifth partition. So, F5 will now have a free remaining space of 135KB (635 - 500)
  • 358KB will be fitted into the second partition. So, F2 will now have a free remaining space of 242KB (600 - 358)
  • 200KB will be fitted into the third partition. So, F3 will now have a free remaining space of 150KB (350 - 200)
  • 375KB will not be assigned to any available memory space because none of the available space can contain the 375KB process.
8 0
3 years ago
Other questions:
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Element will you include to present numerical data on the slide
    13·1 answer
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • Contrast the performance of the three techniques for allocating disk blocks (contiguous, linked, and indexed) for both sequentia
    13·1 answer
  • The three activities in an information system that produce the information organizations use to control operations are:a.informa
    9·2 answers
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • Choose two technologies that you think would help the company meet its goals. Then fill in the chart below to compare the techno
    11·2 answers
  • 3.2 code practice question 2. Not in a rush.​
    15·1 answer
  • What should you try first if your antivirus software does not detect and remove a virus?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!