1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
3 years ago
11

Although a tablet can connect to a cellular network, it cannot be used as a

Computers and Technology
2 answers:
Misha Larkins [42]3 years ago
7 0

Answer:

A tablet can have mobile data such as MetroPCS. But the tablet can not make phone calls or texts.

Ksenya-84 [330]3 years ago
3 0
Communication device.
You might be interested in
Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
Mekhanik [1.2K]

It is great but that's really it.

Don't get me wrong I adore Python, no complications, pure simplicity, wonderful community. But for any larger project that will be scaled I'd never use it. It's slow (mostly because of GIL) and gets pretty hard to organise once you have thousands of .py files but it's still a great language (my first one) when doing quick prototyping, personal projects, learning and it's also AI de facto programming language because of its readability works as a glue with AI.

It's related to flowchart in a way we write algorithms, for eg. in python we rarely use counter in for loop the inverse is thus C++ where most for loops are for loops not for each loops.

Hope this helps.

3 0
3 years ago
Shelly and Donna are discussing System Restore. Shelly says when the System Restore program creates and saves a copy of your com
pav-90 [236]
The answer is D, because it's called a back-up.
4 0
3 years ago
Give a big-O estimate for the number additions used in this segment of an algorithm.
rjkz [21]
Big-O notation is a way to describe a function that represents the n amount of times a program/function needs to be executed. 

(I'm assuming that := is a typo and you mean just =, by the way) 

In your case, you have two loops, nested within each other, and both loop to n (inclusive, meaning, that you loop for when i or j is equal to n), and both loops iterate by 1 each loop.

This means that both loops will therefore execute an n amount of times. Now, if the loops were NOT nested, our big-O would be O(2n), because 2 loops would run an n amount of times.

HOWEVER, since the j-loop is nested within i-loop, the j-loop executes every time the i-loop <span>ITERATES. 
</span>
As previously mentioned, for every i-loop, there would be an n amount of executions. So if the i-loop is called an n amount of times by the j loop (which executes n times), the big-O notation would be O(n*n), or O(n^2). 

(tl;dr) In basic, it is O(n^2) because the loops are nested, meaning that the i-loop would be called n times, and for each iteration, it would call the j-loop n times, resulting in n*n runs.

A way to verify this is to write and test program the above. I sometimes find it easier to wrap my head around concepts after testing them myself.
3 0
3 years ago
Will give brainliest and good amount of points, no false answers.
nlexa [21]

The problem with the swap function is that it loses the value at the first index, as soon as it gets overwritten by the value at the second index. This happens in the first statement. To fix it, you need a helper variable.

First you're going to "park" the index at the first index in that helper variable, then you can safely overwrite it with the value at the second index. Then finally you can write the parked value to the second index:

var swap = function(array, firstIndex, secondIndex) {

let helper = array[firstIndex];

array[firstIndex]  = array[secondIndex];

array[secondIndex] = helper;

};

I hope this makes sense to you.

7 0
3 years ago
In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
Irina18 [472]

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

4 0
3 years ago
Read 2 more answers
Other questions:
  • Application software developed by the user or at the user’s request is called ____ software.
    7·1 answer
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • Research shows that a passive close to a cover letter leads to more interviews. Please select the best answer from the choices p
    8·2 answers
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • Write an algorithm to solve general formula? ​
    10·1 answer
  • Que significa WWW en informática ._.​
    11·1 answer
  • Select the correct category of cybersecurity described.
    6·1 answer
  • ________ can be written only once. The data cannot be erased or written over once it is saved.​
    9·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!