Why are laptop and palmtop computers popular these days?(long answer)

Answers

Answer 1

Answer:

i know of laptop only

Explanation:

laptop is popular these days because it is easier than desktops we can take it everywhere. it is cheaper than desktop computers. if we lost some data we can recover it any time. it is not heavy compared to desktops. it does need keyboard and mouse unless we decide it. it takes low servicieng cost. it takes very less space then the desktops.


Related Questions

Aaden went to the zoo and he was fascinated by the platypuses and wants to learn more about them. What is the best online resource Aaden could use to find this information quickly?

An online animal encyclopedia
A subscription to an online animal magazine that costs money
A brochure from the zoo
An animal outreach section of an online newspaper

Answers

Answer:

An online animal encyclopedia

Explanation:

Encyclopedias are the most reliable source on this list, as they are normally peer-reviewed and checked for falsities.

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

write about the various components of Windows operating system​

Answers

Answer:

The main components of the Windows Operating System are the following:

Configuration and maintenance.

User interface.

Applications and utilities.

Windows Server components.

File systems.

Core components.

Services.

DirectX.

Explanation:

Write a short note on the fifth generation computer​

Answers

Answer:

It's component is bio chips.

It is used in present-future.

I think operating speed is Mili second.

What is the full form of SSD?​

Answers

Answer:

Solid state drives

Explanation:

The type of storage your computer uses matters for performance, including power usage and reliability. Solid state drives (SSDs) and hard disk drives (HDDs) are the two main storage options to consider.

I hope this will help you :-)

the type of memory whose contents are lost when electricity is cut off​

Answers

Answer:

RAM its volatile memory

RAM, thanks me pls bro

Direction: Enci
1. UNIVAC is​

Answers

Answer:

UNIVAC is Universal Automatic Calculator.

It was inveted by Presper J. Eckert and John W. Mauchly, in 90' s

Explanation:

[tex].[/tex]

It is true or false Nowadays computer games are mostly available on external hard disk.​

Answers

Answer:

false

Explanation:

because we're playing it on a mobile phone and a laptop than the hard disk. the hard disk is so old to use it nowadays.

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

What are general purpose computer and special purpose computer?​

Answers

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

Answer:

general purpose computer are designed to be able to perform variety of task when loaded with appropriate program.

special purpose computer are design to accomplish a single task.

TRUE OR FALSE
Mark I was the first working computer.
PLEASE ANSWER FaST

Answers

the answer is false, it was the ENIAC machine
The fast answer is FALSE

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

Difference between pointer and cursor

Answers

Answer:

The difference between Cursor and Pointer. When used as nouns, cursor means a part of any of several scientific instruments that moves back and forth to indicate a position, whereas pointer means anything that points or is used for pointing. Cursor is also verb with the meaning: to navigate by means of the cursor keys.

Explanation:

Hope it helps you

what is the role of computer in education sector?​

Answers

Explanation:

Computer can improve the student learning and basic skill area. Computers not only improve the learning process, it also increases retention of the students. Effective and adequate teacher learning is an integral element of the successful learning program.

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

Full from of tmc computer

Answers

Answer:

Traffic Message Channel,

Answer:

Traffic Message Channel

Explanation:

I hope its your answer

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

help me to solve please​

Answers

Explanation:

Pendrive - small external hard disk

ROM - read only memory - cannot be changed info

printer - produces the hard copy output

mouse - points and selects GUI

ALU - mathematical calculations

Answer:

Explanation:

mouse:points and selects GUI objects.

printer:It produce the hard copy output.

ALU:performs mathematical calculations.

ROM:the instructions stored in it can not be

changed by user.

Pendrive:it can be considered as a small external

hard disk.

life without internet points

Answers

You have to ask a question to get an answer

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator

Answers

Answer:

Explanation:

https://examict.com/refer-to-the-exhibit-baseline-documentation-for-a-small-company-had-ping-round-trip-time-statistics-of-36-97-132-between-hosts-h1-and-h3-today-the-network-administrator-checked-connectivity-by-pingi/

how is computer in each generation distinguished from each other​

Answers

Answer:

By the electrical current flowing through the processing mechanismsWhy do scientist believe the storm is so severe.

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies.

Explanation:

[tex]\sf{}[/tex]

♛┈⛧┈┈•༶♛┈⛧┈┈•༶

xd ... ;)

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

UNIT 1 ACTIVITY

Troubleshooting

Part A

When your friend DaJuan turns on his computer, he hears four beeps. The computer

won't fully boot. DaJuan has a Dell computer with a quad core processor and has

recently upgraded his RAM.

Apply the troubleshooting methodology to help DaJuan understand and resolve his

problem. The steps of the methodology are listed for you. You can write directly on

the write suggestions for DaJuan at each step.

1. Identify the Problem (beeps are key here)

2. Internet Research

3. Establish a Theory of Probable Cause

4. Test the Theory

5. Establish a Plan of Action

6. Implement the Solution or Escalate

7. Verify Full System Functionality

8. Document Findings

Answers

Answer:

all of the above

Explanation:

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

who are your favorite You tubers mine are the Dobre Brothers

Answers

Answer:

mine are H2O delerious and Lazar beam

Explanation:

I enjoy watching watching whatever comes up on my recommended page   :)

Other Questions
NEED HELP NOW!! please and thank you. Calhoun argues that because paid workers and business owners often come into conflict, slavery is a more efficient system than paid labor. Is Calhoun's argument valid? No, his argument is not relevant to his claim. It does o not support the statement that slavery maintains social order. f No, his argument is oversimplified. There are many o more humane ways to resolve conflict other than slavery. O Yes, his argument is accurate. It is based on a fact that can be easily confirmed. Yes, his argument is logical. Slavery is the logical O solution to conflict between paid workers and business Owners. opposite of gracefully This is the name of the Democratic Party political machine that influenced New York City politics in the 1790s and 1960s Redacta un prrafo sobre la importancia del trabajo en equipo donde hagas uso al menos de 5 palabras derivadas HELPPPPPP MEEEE PLESDEEEE given the math statement 23 x 3.1 = 71.3, which of the following statements are true? PLEASE ANSWER CORRECTLY Find the greatest number of students for whom 30 apples, 45pears and 60 oranges can be equally distributed. Find the shares of each item. Explain the process in which root cells get their energy, list all the organelles involved in the process. NO COPY AND PASTE! In the figure, x= ?, y= ?, and z= ? A speed limit of 65mph what is science explain What would be the mass of a 10kg suitcase on Neptune? Algebra 2 Help!! WILL GIVE BRAINLIEST!!Let f(x)=3x^2+x-3 and g(x)=x^2-5x+1. Find f(x)-g(x). Find the midpoint of points A(9, 2) and B(6,-4) graphically.Plot the line segment AB by clicking twice on the graph.Start over10982 6 54326-10---5732CH-u677S910-2-3 4-59-7-8-10 help on god on god please anf thanks what is 6v(2v+3)this is multiplying polynomials answer fast please!! 3. If a complex molecule can be digested to produce sugars, then the original molecules shouldbe classified as which type of biomolecule?A lipidsB proteinsC nucleic acidsD carbohydrates tm li sai tm li sai1.It has been a long time since I have visited Kuala Lumpur. A B C D 2. I wish I have money and time to travel around the world. A B C D 3. I read this novel many times. A B C D 4. When did he saw this play ? A B C D 5. Do you ever known this beautiful woman ? A B C D 6. My sister wishes she doesnt have a lot of homework. A B C D 7. He have just met his friends at the movie theatre. A B C D 2+32 = what is ath ansewer