1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
7

What is the most widely used operating system for mobile devices?

Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
8 0
Android, many phone brands use the Android OS. Unlike Apple, which is the only technology company with IOS.
You might be interested in
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
3 years ago
Read 2 more answers
I want to work with LDAP. what is LDAP?
pychu [463]
It's an internet protocol (Lightweight Directory Access Protocol) used to fetch data from servers.
5 0
3 years ago
Read 2 more answers
Write a code to test if a number is equal to 89 or 78
ANTONII [103]

number = whatever value you want

if number == 89 or number == 78:

   print("The variable number equals 89 or 78.")

else:

   print("The variable number does not equal 89 or 78.")

4 0
3 years ago
The basic building blocks of java is known as<br><br><br><br>Reply fast! plzzzzzzzzzzz!!!
Nadya [2.5K]

Answer:

A class is the basic building block in Java.

8 0
2 years ago
What does software alone enable a computer to do?
tatyana61 [14]
I’m pretty sure A. Connect to the internet. Sorry if I’m wrong
8 0
3 years ago
Other questions:
  • Test Average and Grade
    12·1 answer
  • (70 points, ip address)If anyone can solve all these questions correctly
    7·1 answer
  • Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a
    5·2 answers
  • If two egg cells are fertilized what will happen?
    10·1 answer
  • On the classic gameshow The Price Is Right, contestants must guess the price of an object (guesses are distinct). The winner is
    5·1 answer
  • How can learning opportunities for AI be extended to all
    6·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • In Criminal justice, the type of evidence which contradicts a given theory is known as?​
    15·1 answer
  • Three primary types of data that a forensic investigator must collect, in this order: 1.Volatile data 2.Temporary data 3.Persist
    11·1 answer
  • Point to ______ of a cell to fill the cell to the right or down.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!