1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
7

Which company invented the Android operating system? Apple Nokia Google Microsoft'

Computers and Technology
2 answers:
Phantasy [73]3 years ago
8 0

One of the Developers to the Andriod operating system was

C. Google.

iris [78.8K]3 years ago
8 0
Flyme OS is mainly installed on Meizu Smartphones such as the MX's series; however, it also has official ROM support for a few Android devices. HTC Sense is a software suite developed by HTC, used primarily on the company's Android-based devices.
You might be interested in
What are several networks connected together using a router
elixir [45]

Answer:

local Area Network, Wide Local Area Network and Personal Area Network

8 0
3 years ago
What determines gravitational pull?<br><br> volume<br><br> mass<br><br> the sun<br><br> acceleration
Arte-miy333 [17]
C. The sun is correct!
8 0
3 years ago
Read 2 more answers
You can select a noncontiguous range of cells by pressing and holding the ________ key when using it in combination with other n
leonid [27]
Hey there!

I believe your answer will be the "Shift" key. You can hold down Shift and select a cell from your current cell position to select everything between the original position and the cell you clicked on without having to drag your mouse across the cells. If you were to hold down the Ctrl or Command key, you would only have your original selection and your new selection highlighted. 

Your answer will be Shift. 

Hope this helped you out! :-)
3 0
3 years ago
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
3 years ago
Given a Fully Associative cache with 4 lines using LRU replacement. The word size is one byte, there is one word per block, and
uranmaximum [27]

Answer:

3 bits

Explanation:

Capacity of main memory=16 Bytes=24

The number of address bits= 4 bits.

The size of the word= 1 Byte=20

The word bits=0.

Number of lines =4

Number of sets required=21

The sets bits is =1

The number of offset bits=20=0

Number of tag bits= total number of address bits - (word bits + offset bits + set bits)

= 4 - 0 -0- 1

= 3 bits

8 0
3 years ago
Other questions:
  • You are attempting to update a Windows image that has been mounted under C:\mount on your local system. What command must you us
    13·1 answer
  • How has science fiction influenced technology
    7·2 answers
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • Q. Which protocol would best serve to authorize users to access directory services?
    8·1 answer
  • Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System
    13·1 answer
  • In series connection, if we have two symmetric devices connected with 10 V battery, voltage for each device will be.. .5V or 10V
    10·1 answer
  • Who was the father of computer​
    10·1 answer
  • A regional transportation and logistics company recently hired its first ChiefInformation Security Officer (CISO). The CISO’s fi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!