1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
12

Describe how a user would interact with a smart-phone to do various tasks.Consider inputs and outputs.

Computers and Technology
1 answer:
xz_007 [3.2K]3 years ago
7 0

A smart-phone is also referred to as a mobile device and it can be defined as a small, portable, programmable-electronic device that is designed and developed for sending (transmission) and receiving data (messages) over a network. Thus, a smart-phone must be designed as a hand-held device with communication capabilities.

Basically, the components that make up a smart-phone can be classified into two (2) main categories and these include:

1. <u>Input:</u> it comprises mouthpiece, keyboard, light sensor, etc.

2. <u>Output:</u> it comprises screen, speaker, earpiece, etc.

In this context, an end user would interact with a smart-phone in the following ways to perform (do) various tasks:

  • By using a keyboard to type a text and then sending it to another person.
  • By using a mouthpiece as an input for voice (audio) messages when making call.
  • The screen of a smart-phone displays the necessary information to an end user.
  • When playing a digital music file the speaker produces the output as sound.

Read more on smart-phone here: brainly.com/question/4922532

You might be interested in
Routing in Practice (30 points). For each of the statements below, decide which it is true or false, and briefly justify your an
sergiy2304 [10]

Answer:

a. false

b. true

c. false

Explanation:

a. False, for intra-domain routing distance vector protocol is simple to implement and because all the links have same speed, distance vector routing is better to use. Distance sector routing is simple and least cost-effective than link state routing.

b. True BGP stands for Broader Gateway Protocol and in AS, router uses BGP to decide the best path among multiple possible paths.

c. False, in BGP performance is more important than policy and hence BGP make decision based on shortest path from source to destination while OSPF uses Dijkstra algorithm to decide the shortest path and then works on this policy.

4 0
3 years ago
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Naddik [55]
1. Personally, I always use the same search engine, which is Google. I once opened Bing mistakenly, but obviously returned to Google immediately. Google is my preferred choice because I've used it for such a long time that I've gotten so used to it and cannot change it. The other search engines don't look as appealing to me as Google.

2. Some advantages would be definitely the format of the information you get from a search engine as opposed to the metasearch engine - sometimes, the metasearch engine cannot provide you with complete results or even complete sentences, so you may be left with illegible texts. On the other hand, metasearch engines can give you so much more information than regular search engines.

3. If the credentials seem legit, based on particular rules as to how to write sources used (such as Chicago style, APA, etc.), then you can safely assume the source is credible. If the author wrote everything necessary in his text (especially works cited/links available), you can usually trust that source.
5 0
3 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Is the internet a private place?
Ludmilka [50]
Hey there!

No, the internet is not a private place

I hope this helped! :-)
8 0
3 years ago
Read 2 more answers
Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
kotegsom [21]

Answer:

def LetterGame():

   vowels = ["a", "e", "i", "o", "u", "A", "E", "I", "O", "U"]

   count1 = count2 = 0

   while True:

       choice = input("Enter a letter / digit to stop: ")

       if choice.isdigit():

           break

       elif choice.isalpha():

           count1 += 1

           if choice in vowels:

               count2 += 1

   print("You entered " + str(count1) + " letters, " + str(count2) + " of which weere vowels.")

   print("The percentage of vowels was " + str(count2 / count1 * 100) + "%")

LetterGame()

Explanation:

Create a function called LetterGame

Inside the function:

Create a list of vowels

Initialize count1, counts the total letters, and count2, counts the vowels

Initialize a while loop that iterates until the specified condition is met in the loop

Get the input from the user. If it is a digit, stop the loop. If it is an alphabet, increase the count1 by 1, and also check if it is a vowel. If it is a vowel, increment the count2 by 1

When the loop is done, print the required information

Finally, call the function

4 0
3 years ago
Other questions:
  • What does the acronym vsepr represent {spelling is important} question 1 options:?
    12·1 answer
  • a. Write a function called fizzbuzz. This function will take 1 number as a parameter. The function will print all numbers from 0
    15·1 answer
  • Ano kaya ang nararamdaman mo at mangyari sayo kung tatlong araw ka nang hindi kumakain​
    6·1 answer
  • Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.
    8·1 answer
  • Consider the class ScopeTest defined this way:
    15·1 answer
  • I think it is a or c is it right?
    7·1 answer
  • Malcolm Movers charges a base rate of $200 per move plus $150 per hour and $2 per mile. Write a program named MoveEstimator that
    5·1 answer
  • Hi I'm new to Brainly anyone wanna be my frnd​
    15·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!