1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
7

Handhed computer is otherwise called as 1.laptop 2.Notebook 3.Palmtop

Computers and Technology
1 answer:
NikAS [45]3 years ago
3 0

Answer:

personal digital assistants (PDAs)palmtop

You might be interested in
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
Explain how communication facilitate cordination​
Oksana_A [137]

Answer:

Communication greatly helps in coordination. Effective communication facilitates information and exchange of ideas which helps to achieve the common purpose. Coordination is facilitated by exchange of such ideas and information and brings people together.

Explanation:

4 0
3 years ago
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
Site three uses of powerpoint when it is used for educational purposes.​
CaHeK987 [17]
1. It can be used to create a slideshow for that class.
2. It can used as a place to keep and check grades.
3. It can be used for a place to keep all the students names and where they sit etc.
5 0
3 years ago
What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
olga_2 [115]

Answer:

Enter time 1 HH:MM:SS8:5:22                                                                                                    

Enter time 2 HH:MM:SS7:24:37                                                                                                  

0:40:45

Explanation:

The program for above in Python is:

from datetime import datetime

s1 = input("Enter time 1 HH:MM:SS")

s2 = input("Enter time 2 HH:MM:SS")

Format1 = '%H:%M:%S'

tdiff = datetime.strptime(s1, Format1) - datetime.strptime(s2, Format1)

print(tdiff)

We are using the datetime class in datetime module for using strptime to find the difference between the two times.

3 0
4 years ago
Other questions:
  • PLS HELP GIVING 100 POINTS TO THE PERSON WHO WRITES IT
    6·1 answer
  • What helps in determining the reliability of a person to repay debt?
    13·2 answers
  • Write a program using integers userNum and x as input, and output userNum divided by x three times.
    11·1 answer
  • 1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
    7·1 answer
  • What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
    9·1 answer
  • Question #1
    9·2 answers
  • Three popular types of ____ are handheld computers, PDAs, smart phones.
    13·1 answer
  • What motivated Barbara MBANEFO to become an engineer?
    8·2 answers
  • Why are women more exposed to mass media?
    9·2 answers
  • Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!