1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
4 years ago
5

Drag the correct type of update to its definition.

Computers and Technology
1 answer:
zimovet [89]4 years ago
5 0

Answer:

 

Explanation:

Baseband: The chip that controls the radio frequency waves within a device, is a range before to become in a different frequency range, for example, an audio frequency when is transmitted is a radio frequency.

The Preferred Roaming List (PRL) is a list of radio frequencies, and a database there residing in a wireless device like a cellphone.

PRI The chip that controls the radio frequency waves within a device.

You might be interested in
Calculate the cash used to retire debt for each of the six months. Since the company can't pay down more debt than there is cash
BabaBlast [244]

Answer:

The required cash used to retire a debt can be computed as follows:

Cash used to retire debt = cash available to retire a debt, if the cash available to retire debt is less than the loan balance from previous month. Otherwise, cash used to retire debt is equal to the loan balance from previous month.

The excel formula to perform this task is provided as follows:

D33 = IF(D32<C34,D32,C34)

The same formula is used to get the values for E33 to I33.

Explanation:

See the attached picture for table.

5 0
3 years ago
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
Which is considered the best way to secure a laptop to a desk in a workplace?
Lorico [155]

Answer:

Lock it in a safe is the best way to secure a  laptop to a  desk in a work space.

Explanation:

Since the end user feels that a laptop can be stolen or taken by others is a safe way to keep hire or her laptop in a  safe place.

Bolt  it:-  it is  not possible, because there   is  no   option available

Lock  it is safe:- this  is  idle or best  solution is  safe his or her laptop

Use an alarm :- the person   who steals the laptop will be more intelligent and he or she knows how to disable the alarm system.

Use  cable lock;- it is easy to remove it.

3 0
3 years ago
Which setting indents all but the first line of a paragraph by the selected length?
Phoenix [80]

Answer:

Hanging

Explanation:

5 0
3 years ago
An investor’s stock portfolio consists of four Exchange Traded Funds (SPY, QQQ, EEM, and VXX). Write a program that requests the
Allisa [31]

Answer:

The solution code is written in Python 3

  1. SPY = float(input("Enter SPY Amount: "))
  2. QQQ = float(input("Enter QQQ Amount: "))
  3. EEM = float(input("Enter EEM Amount: "))
  4. VXX = float(input("Enter VXX Amount: "))
  5. totalAmount = SPY + QQQ + EEM + VXX
  6. print("Total amount invested: $" + str(totalAmount))
  7. print("Percentage invested for SPY: " + str(SPY / totalAmount * 100) + "%")
  8. print("Percentage invested for QQQ: " + str(QQQ / totalAmount * 100) + "%")
  9. print("Percentage invested for EEM: " + str(EEM / totalAmount * 100) + "%")
  10. print("Percentage invested for VXX: " + str(VXX / totalAmount * 100) + "%")

Explanation:

Firstly, let's declare four variables, SPY, QQQ, EEM and VXX and use input() function to prompt user to input the amount invested in each fund (Line 1 - 4).

Next, sum up all the funds' amount and assign the total to totalAmount variable (Line 6).

Next display the total amount invested and the percentage invested for each fund using print function (Line 7 - 11). Please note the formula to calculate the percentage of investment is

(fund / totalAmount ) * 100

3 0
3 years ago
Other questions:
  • A(n ____________ is considered a named collection of bytes having persistent or lasting storage.
    10·1 answer
  • You are able to change the formatting of a table after it is inserted into a placeholder. True or false
    9·2 answers
  • You would like to set up on online meeting to communicate with colleagues on a group project. Which of these tools should you su
    5·2 answers
  • What information is kept in the cached lookups folder for a dns server?
    9·1 answer
  • What are computers used for?
    14·2 answers
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • Help please and thank you
    11·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Plz help
    8·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!