1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
9

1st and 2nd

Computers and Technology
1 answer:
motikmotik3 years ago
7 0

Answer:

1. PDA (not 100% sure)

2. Smartphone

3. Cellphone

Have a good day :)

You might be interested in
Who is tim berners-lee
Juli2301 [7.4K]

Answer:

He is a Professorial Fellow of Computer Science at the University of Oxford and a professor at the Massachusetts Institute of Technology.

6 0
3 years ago
Read 2 more answers
Cylinder heads with four valves flow more air than those with two valves because they
Effectus [21]
Are able to hold more air
8 0
3 years ago
Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfa
klemol [59]

Answer:

customer-serious orientation

Explanation:

Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.

This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.

Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.

6 0
3 years ago
The _____ component of a database management system (dbms) is used to add, delete, modify, and retrieve records from a database.
ikadub [295]
The correct answer is:  [A]:  "data manipulation" .
________________________________________________________
3 0
4 years ago
Read 2 more answers
How are switches indirectly involved in ARP poisoning?
11Alexandr11 [23.1K]

Answer:

They

are indirectly involved in the attack because they do not verify the the MAC/IP address

association

Explanation:

PLEASE MARK ME AS BRAINLIEST

8 0
3 years ago
Other questions:
  • Help please?
    10·1 answer
  • What possible effects could cyber attack have on Johannesburg stock exchange
    6·1 answer
  • What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
    9·1 answer
  • Which statement about trees is false?
    12·1 answer
  • This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a windows co
    10·1 answer
  • Write a program to take in a time-of-day on the command-line as 3 integers representing hours, minutes, and seconds, along with
    13·1 answer
  • Select the correct answer.
    12·2 answers
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • PLEASE ANSWER QUICK
    13·2 answers
  • 3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!