1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
15

Name at least 3 different portable computer devices that can be purchased

Computers and Technology
2 answers:
cluponka [151]3 years ago
7 0
Phones

Laptops/Computers

Consoles

(Also tablets).
rosijanka [135]3 years ago
3 0

Answer:

Smart Phone

Cameras

Console Controller

Brainliest and please say if its right!!

You might be interested in
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
Need the answer rn!!!!
Julli [10]

Answer:

what language is this? english or no

Explanation:

8 0
3 years ago
UDP provides unreliable data transfer and therefore
vova2212 [387]

Answer: The answer is d.

Explanation:

UDP is a transport protocol (Layer 4 of the OSI model) that has no mechanism to provide a reliable transport between the source process and the destination one, as TCP does.

Anyway, due to this feature, is specially suitable for real-time applications , like video or audio, provided that the user can accept some loss in the stream.

Several real-time protocols, like RTP for instance (used for videoconferencing)  use UDP as transport protocol.

4 0
3 years ago
I’m so lost. which username do i do.
koban [17]

Answer:

the username you feel like using

5 0
3 years ago
Read 2 more answers
Literally not even a true question, I just want to know
german
I’m here because of k12
3 0
3 years ago
Read 2 more answers
Other questions:
  • Consider this program segment: int newNum = 0, temp; int num = k; // k is some predefined integer value 0 while (num > 10) {
    9·1 answer
  • Gretchen has just started making a new presentation in a series of PowerPoint presentations. The default formatting for text in
    12·1 answer
  • These statements describe the NOS.(choose all that applies)
    13·2 answers
  • What term is used to describe the time it takes a signal to travel from one location to another on a network?
    13·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • Write programs for two MSP430 boards to do the following:
    15·1 answer
  • Highlights the possible risks and problems that should be addressed during the implementation process
    6·1 answer
  • Write down the result of each expression in the output column and specify the datatype of the result.Datatype should follow the
    14·1 answer
  • The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
    8·1 answer
  • Write a program that prompts the user for two numbers then outputs the result of dividing the first number by the second number
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!