1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
15

What operating system is a smart phone most likely to use?

Computers and Technology
1 answer:
nirvana33 [79]3 years ago
6 0
Answer:
Linux

Reason:
According to Google, BSD is discontinued. Symbian is also discontinued. Linux is on some smartphones. Max OS X are for computers.

Hope this helped!
You might be interested in
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
Which of the following is the most-polluting energy source?
ira [324]
The answer to your question is D. Coal.
7 0
4 years ago
Read 2 more answers
Angela wants to give her press release an attractive and cohesive appearance. How can she quickly format her press release so it
I am Lyosha [343]

Answer:

Press release tools on websites

Explanation:

There are several tools on websites that provide quick press release. It is possible to directly select the style from several choices. Each style has own fonts and colors however, it is possible to change them.  

Step by step;

Angela may enter the website that provides press release

Then can select a theme with fonts and colors

Then she can put her work

It is ready to publish

8 0
4 years ago
Two VALS segments stand apart. One segment represents the group with the highest resources and innovation and the other segment
irina1246 [14]

Answer:

Innovators and Survivors

Explanation:

The innovators are always interested in new information, are open to new ideas and trying out new things, future oriented and excellent problem solving skills. They represent the group with the highest resources according to the VALS segments.

Survivors are the group with the lowest resources. They are risk adverse, and exhibit low motivation towards new ideas or experiences.

3 0
4 years ago
A goal should be___.
Luda [366]

Answer:

D

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c
    6·1 answer
  • FILL IN THE BLANK.
    15·1 answer
  • You have just created a one-way incoming trust in your domain for an external domain used by a partner company to allow your dom
    11·1 answer
  • In what year was google launched on the web?
    14·1 answer
  • What is a Joint Staff approved, standardized communications link that is suitable for the transmission of digital information an
    5·1 answer
  • From a database point of view, the collection of data becomes meaningful only when it reflect
    8·1 answer
  • Why does a computer need an operating system?<br><br> ​
    10·1 answer
  • A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
    15·1 answer
  • View the contents of the /root/.bash_profile file. type cat /root/.bash_profile at the prompt to answer the question. what is th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!