1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
13

What type of Samsung is this?

Computers and Technology
2 answers:
tiny-mole [99]3 years ago
8 0
Galaxy stratosphere ll
Ilya [14]3 years ago
5 0

Answer:

Galaxy Stratosphere II?

Explanation:

You might be interested in
You have dinner with your family and tell them that you have taken bcis. your mother tells you that she is proud of you and that
VikaD [51]
The answer is (D) <span>I'll show you how to set up a simple database with one table called 'recipes.' You'll be able to manage it and run simple queries on it to find specific recipes very quickly and easily. All you need is some rudimentary knowledge of access to get the job done.
</span>

Spreadsheets are not bad for number crunching. However, if you have lots of data, you may benefit from efficient data management tool. Replacing spreadsheets with databases help you manage data centrally, safely and securely. By employing a database, you can avoid making mistakes like miscounts and data entry errors.

Learning Access can be a little bit daunting and intimidating. Through self-dedication, one can conquer and learn to create simple but functional database.


4 0
3 years ago
Please answer this correctly what’s the answer opening modify style dialog box enables you to
Aloiza [94]
The answer is all of the above
4 0
3 years ago
From an IT perspective, which of the following best describes BI and BI apps?
Natali5045456 [20]

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

4 0
3 years ago
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
Round Robin Algorithm
Reil [10]

Answer:

Please check the attachment.

Explanation:

avg turnaround time = (38+7+42+33+18)/5= 27.6

avg waiting timee = (33+5+28+23+17)/5= 21.2

And its D, A C in Gantt chart at last and exit time are 33, 38 and 42 mentioned as last three in Gantt chart.

7 0
2 years ago
Other questions:
  • Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
    13·2 answers
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • The best place to start when you are looking for information about a device or an application is the ____ of the company that ma
    14·1 answer
  • You are running out of storage space on one of your servers. you need to purchase an external hard drive, as there are no drive
    8·2 answers
  • Lesson 3 - Calling All Operators
    6·1 answer
  • Which software manages the functioning of the entire computer system<br>​
    7·2 answers
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!