A smart-phone is also referred to as a mobile device and it can be defined as a small, portable, programmable-electronic device that is designed and developed for sending (transmission) and receiving data (messages) over a network. Thus, a smart-phone must be designed as a hand-held device with communication capabilities.
Basically, the components that make up a smart-phone can be classified into two (2) main categories and these include:
1. <u>Input:</u> it comprises mouthpiece, keyboard, light sensor, etc.
2. <u>Output:</u> it comprises screen, speaker, earpiece, etc.
In this context, an end user would interact with a smart-phone in the following ways to perform (do) various tasks:
- By using a keyboard to type a text and then sending it to another person.
- By using a mouthpiece as an input for voice (audio) messages when making call.
- The screen of a smart-phone displays the necessary information to an end user.
- When playing a digital music file the speaker produces the output as sound.
Read more on smart-phone here: brainly.com/question/4922532
Answer:
Operating system is the software that is used to control different hardware of computers and handle scheduled tasks.
It also handles the interrupts from some external devices, or from some software. The interrupts are handled through Interrupt service routine. When some external event occurs the following steps has been taken by OS to perform the operation
- In first step, an external event has been occurred, and request to the cpu to perform operation.
- This request invoke ISR (Interrupt service routine), to perform the operation.
- The interrupts are stored in stack on the priority basis.
- The CPU performs the operation on Interrupt as per request of ISR.
- After Completing operation, CPU return to its initial task.
Answer: data loss protection
Explanation:
In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.
It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.
So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.
Answer:
void printC()
{
int i, j;
for (i = 0; i < 4; i++) //i indicate row number. Here we have 5 rows
{
printf("C"); //print C for every row
for (j = 0; j < 6; j++) //j indicate column number. Here we have 7 Rows
{
if (i == 0 || i == 4) //For first and last row
printf("C"); //print 'CCCCCCC'
else if (i = 1|| i= 3) //for Second forth row
printf("C + +"); //print 'C + +'
else if (i = 2) For second row
printf("C +++++"); //print 'C +++++'
else
continue; //to jump to next iteration
}
printf("\n"); // print in next line
}
}
c) open
I think this because when you're in an open space (such as starbucks) it's public for anyone to enter. I think.