1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
6

Which of the following were input devices for early portable computers?

Computers and Technology
1 answer:
nordsb [41]3 years ago
5 0

Answer:

Notebooks

Explanation:

The answer is Notebooks

You might be interested in
A 3-Tier computing environment is constructed of ....... servers ?
Inessa [10]

Answer:

B. Tow

Explanation:

Application server and database server

6 0
3 years ago
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second,
Marina86 [1]

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.

3 0
3 years ago
Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?
Thepotemich [5.8K]

Answer:

Its A

Explanation:

I just took the review

8 0
4 years ago
Read 2 more answers
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
Sending obscene material over the internet cannot be successfully prosecuted because of what
babunello [35]
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
5 0
3 years ago
Other questions:
  • An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
    5·1 answer
  • What email address should you use to send questions to a UC faculty or staff member?
    14·2 answers
  • The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platf
    13·1 answer
  • What are some “creatures/animals” that Rex imitates?
    14·1 answer
  • The fraction 460/7 is closest to which of the following whole numbers?
    11·1 answer
  • Generate a row vector b=[1 2 3 4 5 6 7 8 9 10] using linspace function, give the commands and show print-screen of the result.
    11·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • PLSSS HELPP IM DESPERATE!!!
    11·1 answer
  • What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the g
    7·1 answer
  • I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choos
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!