1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
6

True or false mobile devices need to work within limited screen space

Computers and Technology
2 answers:
Mama L [17]3 years ago
5 0

Answer

TRUE

Explanation

Mobile devices are portable computing devices such as a smartphones or tablet computer.These devices are designed to be extremely portable, and they can often fit in your hand and they are powerful enough to do many of the same things you can do with a desktop or laptop computer.Mobile devices need to work within limited screen space.

eduard3 years ago
3 0
A phone may have a 4 inch screen and so it cant just extend to 5 inches. So it would he true
You might be interested in
What are the functions of the windows button, Task View and Search Box? give me short answer
artcher [175]

Answer:

Windows button = You can see a Start Menu

Task view = You can view your Tasks

Search Box = You can search any app you want in an instance

6 0
3 years ago
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
Display the cost of landscaping a backyard with sod that is sold by the square foot and fencing that is sold by the foot. The in
Ipatiy [6.2K]

Answer:

length = float(input("Enter length of the backyard in foot: "))

width = float(input("Enter width of the backyard in foot: "))

sod_price = float(input("Enter the price of sod per square foot: "))

fencing_price = float(input("Enter the price of fencing per foot: "))

area = length * width

perimeter = 2 * (length + width)

cost = sod_price * area + fencing_price * perimeter

print("The cost of landscaping is $" + str(cost))

Explanation:

*The code is in Python.

Ask the user to enter the length, width, sod_price, and fencing_price

Calculate the area and perimeter of the backyard

Calculate the cost, sod_price * area + fencing_price * perimeter

Print the cost

7 0
4 years ago
TRUE/FALSE
algol [13]
<h2>Answer:</h2>

Following are given answers to each part with explanation:

<h2>Explanation:</h2>

1. lt takes multiple clock cycles to access data from memory.

The statement is TRUE.

Accessing data from memory acquires two steps. In first step the address is read and in second step we go to the address in order to access the data.

2.Each byte of memory has a unique address.

The statement is TRUE.

Each byte in the memory attains a unique address therefore we can access the data residing at each byte specifically by giving address.

3.The total memory used by all running programs can never be larger than the computer's physical memory.

The statement is TRUE.

The running parts are always a sub part o a system so combining them all cannot exceed the total size of computer's physical memory.

4.The lower half (or least significant half) of the EBX register is called BX.

The statement is TRUE.

BX is he least significant or lower half of the register EBX (extended BX).

5.The following data locations are in order of fastest access time to slowest access time: cache, registers, main memory.

The statement is TRUE.

Yes the order of data locations from faster to lower is given correctly:

Cache is accessed faster than registers and in the end comes main memory.

6.The ALU performs only addition, subtraction, multiplication, and division operation:s

The statement is FALSE.

ALU is an abbreviation of Arithmetic Logic unit. So it performs arithmetical operations such as addition, subtraction, multiplication, and division as well as the Logical operations that are AND OR NOT XOR.

7. The control unit (CU) coordinates the sequencing of execution steps in an instruction cycle.

The statement is TRUE.

As obvious from the name Control unit (CU) has assigned the coordination of execution of steps in sequence.

8.The EIP register is updated when an instruction is fetched.

The statement is TRUE.

Whenever the user retrieve any instruction from EIP or fetch the instruction from it. EIP gets updated.

9.The step to fetch an operand is always necessary in the instruction cycle.

The statement is TRUE.

Most of the Instructions demand an operand in the instruction cycle so that they could be operated on. While some instruction not demand the operand such as Exit. But majority demands the operand so it is true.

10.In an instruction cycle, the operands are fetched before the instruction is fetched.

The statement is FALSE.

The first part of instruction cycle is to fetch the instruction, whereas the operands are fetched after it. So the statement get FALSE.

<h3>I hope it will help you!</h3>
5 0
3 years ago
Consumers must learn how to separate the truth from __ techniques
dmitriy555 [2]

Consumers must learn how to separate the truth from deceptive techniques.

Explanation:

Deceptive advertisements are hazardous for both consumer and advertiser. It is a misrepresentation of the nature of products or services promoted falsely by advertisers.

Professionals exploit consumers by following means:

  • false or incomplete information,
  • fraudulent activities
  • deceptive practices.

It may involve -

  • financial theft,
  • health risks,
  • scams, etc.  

Having proper knowledge about such practices and taking legal actions against fraudsters can help claim for the damages incurred.

3 0
3 years ago
Other questions:
  • Consider the latency model for static congestion windows. If the server receives an acknowledgement for the first data segment i
    5·1 answer
  • Which occupation requires certification by the state?
    15·2 answers
  • A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail accou
    6·2 answers
  • You view a portion of a document on the screen through a
    14·1 answer
  • Please help!!!
    9·2 answers
  • Which of these is an example of input?
    6·1 answer
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
  • If every company is now a technology company, then what does this mean for every student attending a business college
    8·1 answer
  • How are most databases organized?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!