1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
6

Type of operating system used i handleheld device

Computers and Technology
1 answer:
natka813 [3]3 years ago
8 0

Answer:

6

Explanation:

  • Palm OS
  • PocketOS
  • SymbianOS
  • LinuxOS
  • Windows
  • Android

You might be interested in
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
What is the name of Thompsons computer language?
olchik [2.2K]

Answer:

below

Explanation:

Bon programming language

6 0
3 years ago
Read 2 more answers
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
choli [55]

Answer:

Option B,C,E

Explanation:

4 0
3 years ago
A software application used at one computer to interact with other nodes on a network is called_____.
Ivanshal [37]

Answer:

A MIRCOCOMPTER NETWORK

Explanation:

3 0
4 years ago
first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.
pshichka [43]

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

3 0
3 years ago
Other questions:
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Which of the following is the largest disadvantage of wind power?
    12·2 answers
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • 5.11 Of these two types of programs:a. I/O-boundb. CPU-boundwhich is more likely to have voluntary context switches, and which i
    9·1 answer
  • What types of standards are developed by the Electronics Industries Alliance (EIA)?
    14·2 answers
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • Define basic logical gates with its symbol, algebraic expression and truth table.​
    15·2 answers
  • (PLEASE HELP!! I'll award brainiest!!)
    6·2 answers
  • Say true or false. a)ICT in education is used as teaching learning aid
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!