1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
13

What is web based What is local What is mobile in computer

Computers and Technology
1 answer:
Radda [10]3 years ago
6 0

Answer:

The mobile web refers to browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, or a device. hope this helps :)

Explanation:

You might be interested in
The technology that identifies people through bodily characteristics is known as
vlabodo [156]
C. Biometrics, examples of common biometric devices are finger print scanners (iphones, phones, laptops etc..) and pupil scanners.  
3 0
3 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
4 years ago
Match the items with their respective descriptions.
kap26 [50]

a is 3

b is 1

c is 2

d is 4

7 0
4 years ago
Read 2 more answers
Approximately how many user accounts were affected by a 2013 hack of the yahoo technology company, which it just announced this
torisob [31]
About one billion user accounts were affected
3 0
4 years ago
"The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
Hatshy [7]

Answer:

Active Directory

Explanation:

The 2012 R2 Windows Server  is the 6th version of  Windows Server server operating system which is made by Microsoft. It is a part of the Windows NT family of the operating systems.

Active Directory helps to store the default user profiles as well as the user login scripts.

It helps to assign the system policies, assign  permission to the users overt he network resources and also to deploy software in a centralized manner.

3 0
3 years ago
Other questions:
  • Which of the following is not a reason that the subject line should never be left blank?
    13·2 answers
  • Add a throw statement to the processNumbers function that throws the message "All elements in the list should be numbers." if on
    12·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • What is the definition of D1-D4?
    14·1 answer
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
    9·1 answer
  • p25: File Write and Read1) User enters a file name (such as "myMovies.txt").2) User enters the titles of 4 of their favorite mov
    12·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
  • A database admin uses a SHOW statement to retrieve information about objects in a database. This information is contained in a _
    10·1 answer
  • Identify the calculation performed by the following code.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!