1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
9

If you wanted a smartphone with the fewest restrictions on application development which smartphone operating system should you

choose
Computers and Technology
1 answer:
Elodia [21]3 years ago
3 0

Answer:

Apple iOS

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Proprietary software: it's also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer.

II. Open-source software: it's a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

An Apple iOS is an example of an operating system that has the open-source software features and as such its users are faced with minimal restrictions on application development.

This ultimately implies that, if you wanted a smartphone with the fewest restrictions on application development the smartphone operating system you should choose is Apple iOS.

You might be interested in
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
ZyDE 1.4.2: Fixing syntax errors.
skad [1K]

Using the knowledge of computational language in JAVA it is possible to write a code that Fixing syntax errors Click run to compile, and note the long error list.

<h3>Writting the code:</h3>

<em>public class BeansInJars {</em>

<em>    public static void main(String[] args) {</em>

<em>        int numBeans;</em>

<em>        int numJars;</em>

<em>        int totalBeans;</em>

<em>        numBeans = 500;</em>

<em>        numJars = 3;</em>

<em>        System.out.print(numBeans + " beans in ");</em>

<em>        System.out.print(numJars + " jars yields ");</em>

<em>        totalBeans = numBeans * numJars;</em>

<em>        System.out.println(totalBeans + " total");</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12975450

#SPJ1

5 0
2 years ago
Bruno took the computer that he uses at work, and Pauline sits on the beach with her laptop computer, which she connects to the
Anika [276]

Answer:

Mobile Hotspot

Explanation:

using Mobile Hotspot you can connect to the internet using mobile data.

For this to work you should turn off the Wi-Fi in your mobile if any. We can connect more than one device using mobile hotspot

4 0
3 years ago
What is a graphical user interface?
alex41 [277]

Answer:

A GUI (graphical user interface) is a system of interactive visual components for computer software. A GUI displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.

Explanation:

GUI objects include icons, cursors, and buttons. These graphical elements are sometimes enhanced with sounds, or visual effects like transparency and drop shadows.

A GUI is considered to be more user-friendly than a text-based command-line interface, such as MS-DOS, or the shell of Unix-like operating systems.

6 0
4 years ago
Read 2 more answers
Assuming we are using the Hamming algorithm presented in your text and even parity to design an error-correcting code, find the
Rudik [331]

Answer:

Before redundancy :100101011100

After checking parity redundancy: 100101010011

Explanation:

First calculate redundant bits ,

We know that the number of redundant bits can be calculated using the following formula:

2^r ≥ m + r + 1

r = redundant bit, m = data bit

total data bits = 8

so ,

2^4 ≥ 8 + 4 + 1

16 ≥ 13

so, redundant bits is 4

Now let they denoted by r1, r2, r4, and r8, as the redundant bits are placed at positions corresponding to power of 2:    1, 2, 4, and 8.  

All the redundant bits are initialized by zero.

For the data word 10011011, we can let  the bits of the data word as  w8,w7, w6, w5, w4, w3, w2, w1

Now , put data bits and redundancy bits  as follows.

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    0   0

r1 = d1  xor  d3  xor d5  xor d7  xor  d9  xor d11

r1 =  0  xor  0  xor 1  xor 1  xor  1  xor 0

r1 =  1

r2 = d2  xor  d3  xor d6  xor d7  xor  d10  xor d11

r2 = 0  xor  0  xor 0  xor 1  xor  0  xor 0

r2 = 1

r4 = d4  xor  d5  xor d6  xor d7  

r4 = 0  xor  1  xor 0  xor 1

r4 = 0

r8 = d8  xor  d9  xor d10  xor d11   xor d12

r8 = 0  xor  1  xor 0  xor 0 xor  1

r8 = 0

So, the data transferred is

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    1   1

The bits give the binary number as 0011 whose decimal representation is 3. Thus, the bit 3 contains an error. To correct the error the 3th bit is changed from 1 to 0.

3 0
3 years ago
Other questions:
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
    5·1 answer
  • What is company NDR?​
    11·1 answer
  • A stateful inspection firewall ________. select one:
    14·1 answer
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • Create a class called StockTester that has the following fucntionality. a. Create a main method with an ArrayList named dataStoc
    9·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
    12·1 answer
  • A Social agency hires Accenture to improve training and experiences for caseworkers. What is one way Accenture can use Virtual R
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!