Answer:
Android
iOS
Explanation:
Operating systems refers to the embedded software program upon which a machine ( computer or smartphone) is programmed to work. Applications or programs which machines would run must be compatible with that which is designed for the operating system. Operating systems handles and controls process and file management, input and output among others.
The Android and iOS operating system are the two most popular operating systems used on smartphones. In terms of ownership, iOS is developed by Apple and it is not open source (closed source). It has a simple and very less customizable interface. Smart products such as iPhones, iPads run on iOS operating system.
Android on the other hand is runned by googl and is more open source, with a much more customizable interface, android garners more
popularity in the smartphone ecosystem. Most major smartphone devices run on Android such as Samsung, Sony and so on.
Other operating systems may include windows which are very less popular.
Answer:
The benefits of automated operations are higher productivity, reliability, availability, increased performance, and reduced operating costs.
Explanation:
Memory, registers and secondary storage all work together so as to create or produce an ideal storage conditions.
<h3>How does memories works together?</h3>
The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.
An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.
Learn more about Memory from
brainly.com/question/25040884
Answer:
<h2>This is Phishing attack</h2>
Explanation:
What is Phishing attack?
Phishing attack involves sending of sending of unwanted spam mails, well disguised mails to potential victims, it was designed to steal the potential victim's information such as passwords and mails to his/her banking platform.
The goal is to deceive victims into clicking on a link and taking them to a website that asks for their login and password, or perhaps their credit card or ATM number.
People who attack using phishing are called <em>cyber attackers</em>
Suppose that a linked list is used as a data structure for the hash table, create a program that includes steps his application counts the number of phrases in documents decided on via way of means of the user #include.
<h3>What is Programming?</h3>
It is the manner of making hard and fast commands that inform a pc the way to carry out a task. Programming may be finished the usage of lots of pc programming languages, inclusive of JavaScript, Python, and C++.
- This application counts the quantity of phrases in documents decided on via way of means of the user.
- #include
- #include
- #include the usage of namespace std; //Function 1 int count(string word)go back word.size();
- }
- //Function 2
- int vowel(string word)> filename;
- //Open the {input|enter">enter file.
- inputfile.open(filename.c_str()); cout<<"nWord listing after format";
- cout<<"n____nn"; //If the file succesfully opened, process it.if (inputfile).
Read more about program :
brainly.com/question/1538272
#SPJ1