Which is usually the smallest computer?a. personal computer
c. PDA
b. PC
d. notebook computer

Answers

Answer 1
Answer: i would have to say it would be a PDA, because they generally arent much bigger than a cell phone. at least mine is pretty small anyway. there are certain brands that make larger ones almost the size of a tablet, but in general terms, PDAs are usually pretty small. hope this helps.

Related Questions

Question 1:Which of the following is involved in weathering?a. waterb. seafloor spreadingc. mountain buildingd.volcanoesQuestion 2:What types of rocks initially form from deposition?a. igneousb. sedimentaryc. metamorphicd. basalticQuestion 3 :Air, water, and ice can break rocks into tiny fragments. Which of the following best describes this process?a. erosionb. depositionc. weatheringd. sediment
When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size of the shape changing the location of the shape changing the types of sizing handles hiding the shape so you cannot select it
Which software scans your computer for viruses in the operating system, emails, files, or hard disks, and then deletes them?
How long does it take to charge the oculus quest 2
What span of dates best represents the Romantic era?

What is the final result of the expression 7/2 + 6?0
O
9.5
9
o
0.875

Answers

Answer:

Choice A

  • 9.5

Explanation:

There's one way to solve this problem.

\displaystyle  \cfrac{7}{2}  + 6

Re-rewrite +6 as 6/2.

\sf =  \cfrac{7 }{2}  +  \cfrac{6}{1}

Now solve for LCM of the two denominators, 2&1:

  • 2 * 1
  • 2

Then, solve.

=  \cfrac{7 + 12}{2}

=  \cfrac{19}{2}  =  \boxed{9.5}

Choice B.

#TogetherWeGoFar

Regards, Hannah

What are the two types of formulas in excel

Answers

Hi Lisa


Complex and simple


I hope that's help :)

Identify the layout in which you will be able to view and edit the header and footera. normal layout
b. web layout
c. print layout
d. reading layout

Answers

The answer is (c.) Print Layout

The print layout view is the default view in Microsoft Office Word upon opening the application. In a new document, to add a header and a footer, go to Insert Tab. Under the Header and Footer section, you have the option to add a header and a footer. There are built-in designs to choose from by just clicking on the drop down arrow.

Answer:

c

Explanation:

:)

How can you create a document using a predefined table​

Answers

Click the file tab, and then click New. * Under available templates , click New from existing . * Click a template or a document that is similar to the one that you want to create, and then click create New

Which graphic file format would you choose if you needed to make an animated graphic for a website? ai

png

gif

py
please help

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is gif.

Gif is a series of images that are used as animated graphics for a website. A gif is the file format of an animated image. You may have seen many animated images on websites like stickers etc.

other options are not correct because:

ai: is adobe illustrator file format

png: png is an image file format but not for an animated image

py: py is a file extension of the python file.

When it comes to creating animated graphics for a website, the most commonly used file format is GIF (Graphics Interchange Format).

The correct option is C.

GIF files support animation by displaying a series of frames in a sequence. Each frame contains a different image, and when played in quick succession, it creates the illusion of movement.

GIFs are widely supported by web browsers and can be easily embedded in web pages. They are particularly popular for creating small, simple animations such as icons, logos, or short loops. GIFs also support transparency, allowing you to have parts of the image appear transparent or semi-transparent, which can be useful when integrating the animation into a website design.

On the other hand, the other options mentioned in the question are not suitable for creating animated graphics for a website.

- AI (Adobe Illustrator) is a file format used for vector graphics, typically created and edited in programs like Adobe Illustrator. While AI files can contain animations, they are not commonly used for web animations.

- PNG (Portable Network Graphics) is a file format that supports static images with high quality and transparent backgrounds. However, it does not support animation by default.

- PY is a file extension used for Python programming language files. It is not a file format suitable for creating graphics or animations for websites.

Know more about GIF,

brainly.com/question/33647473

#SPJ3

Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Answers

The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.

The correct matching for the first part of the question is:


1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans

The correct matching for the second part of the question is:


1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders

The correct matching for the third part of the question is:


1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key

Learn more about The CIA triad:

brainly.com/question/30479580

#SPJ11