1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
11

Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp

hone. What is it lacking? A. a program B. input C. output D. memory
Computers and Technology
2 answers:
marysya [2.9K]3 years ago
6 0

Answer:

i would say C.output

Explanation:

the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.

Anastasy [175]3 years ago
3 0

Answer:

i think c because to create a smart phone you need to have an output, the software is there but the hardware is lacking.

You might be interested in
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information f
slava [35]

Answer:

C. NFC

Explanation:

NFC stands for Near Field Communication. NFC is been embedded in recent mobile device (ranging from phone to tablet) to ease payment. NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance.

From the option, Bluetooth look like a probable answer but when they are both compared; we realized that NFC has a shorter set-up time over bluetooth and is therefore faster than bluetooth.

3 0
3 years ago
Photoshop files are generally small in size. True or false
Alborosie

Answer:

true

Explanation:

I'm not really sure

4 0
3 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
To find your personal learning style you can
JulsSmile [24]
Https://simplelifestrategies.com/sls-learningstyle/ this list may help ypu decide
6 0
3 years ago
Read 2 more answers
How does computer network work in a paragraph
Maksim231197 [3]

You go in to the networks crosh/Linux and you insert the info you want in code

7 0
3 years ago
Other questions:
  • What is a way to minimize technical problems with computer
    13·1 answer
  • Which is a feature of a strong thesis statement? A) It presents only the facts. B) It is open-ended. C) It answers the central q
    15·1 answer
  • What is the Default path for SYSVOL?
    14·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • Can your digital footprint be destroyed or does it remain active on the internet forever
    5·1 answer
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • 1. What does a computer
    7·2 answers
  • Kinda strange, and im good
    11·2 answers
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!