Which of these is installed only on Apple smartphones and tablets?

Windows

Android

Linux

iOS

Answers

Answer 1
iOS. It's Apple's own custom OS system, built for their tech.
Answer 2
iOS, I don’t know much about I just know when I need to up date my phone it says I’m updating to iOS whatever number I’m updating to.

Related Questions

HI IM DORAS SISTER AND IM ASKING IF YOU GUYS COULD HELP ME FIND MY SISTER PLS AND THANK YOU.

Answers

?????????????????????????????????????????

Answer:

BRO SHES IN SWIPERS CRIB

Explanation:

I JUS SAW YOUR GIRLLLL

WILL GIVE BRAINLIEST! The command simplify is used if you only want the first two digits of a decimal to appear in the interpreter.

true

false

Answers

Answer:

falsee?

Explanation:

Answer:

Yes its false i believe

Explanation:

the application you attempted to authenticate to is not authorized to use cas. contact your cas administrator to learn how you might register and integrate your application with cas.

Answers

If you're seeing this error message, it means that the application you're trying to authenticate with is not authorized to use CAS. CAS is a Central Authentication Service that allows applications to securely authenticate users.

If you're the administrator of the application in question, you'll need to register and integrate your application with CAS. This process is usually pretty straightforward, and there are plenty of resources available to help you get started.

If you're not the administrator, you'll need to contact the CAS administrator to resolve the issue. In most cases, they'll be able to help you get set up with the necessary credentials.

Learn more on CAS here:

https://brainly.com/question/26986135

#SPJ4

briefly describe the difference between the working directory, parent directory, home directory, root directory,

Answers

Answer: Home directory is the default working directory when a user logs in. On the other hand, working directory is the user's current directory. Working directory can be changed. It can be changed using cd command.

Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw captures?

Select one:
a. because RAW files are fluid and can be whatever the photographer wants them to be
b. because RAW files were designed to encompass everything other than JPEG
c. because RAW files are proprietary
d. because RAW files are non-proprietary

Answers

Answer:

c. because RAW files are proprietary.

Explanation:

When scanners and digital cameras are used to capture images that are uncompressed or minimally processed image file, it is known as a RAW image file.

Generally, this file type are usually very large in size because of their lossless quality and does not have any alteration and as such have not been processed; thus, cannot be printed.

The term RAW image file is generally used to describe a variety of file formats, which are sometimes known as digital raw captures because RAW files are proprietary.

Date:
Pages
who invented Pascaline? Explain its features​

Answers

Answer:

I jus need mo pointssssssssssssssssss

blaise pascal invented it. it’s the first calculator to be produced in and quantity and actually used.

while developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application.

Answers

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application. This describes the backdoor security weakness.

When developing a network application, it's important to be careful of potential security weaknesses. One such weakness is known as a "backdoor." This is when a programmer includes code that allows them to access the running program without authentication. This can be used to capture debugging data, but it also leaves the program open to potential attacks.

Forgetting to remove this functionality prior to finalizing the code and shipping the application is a serious mistake. If an attacker finds the backdoor, they can exploit it to gain access to the program or data. This can lead to data loss or theft, and in some cases, ransomware attacks.

To avoid these risks, it's important to carefully check your code for any potential backdoors before shipping it. If you do find one, make sure to remove it and secure the program before releasing it to the public.

Learn more on backdoor security weakness here:

https://brainly.com/question/27996068

#SPJ4

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

Answer:

False

Explanation:

Information stored on CD-ROM disc must be read and then erased.True or false?​

Answers

Answer:

False

Explanation:

Which of the following is the biggest issue facing wireless communication today?
O deregulation
O cost of technology
O monopoly of services
O threats to privacy
** if you can help me with this unit pls comment

Answers

Answer:

threats to privacy

Explanation:

What would a match() property that passed the expression /^[0-9]/ check for?
A.
all strings that do not contain numerals
B.
all strings that contain only numerals
C.
all numeric values
D.
all strings that contain numerals but start with ^
E.
a string that contains only one numeral between 0 and 9

Answers

Answer:

E

Explanation:

I took the test

Answer:

B.  all strings that contain only numerals

Explanation:

if a lockout relay becomes defective, it should be replaced with an exact duplicate, sometimes called a(n)?

Answers

Impedance relay is a condition where a lockout relay becomes defective, it should be replaced with an exact duplicate.

A locking relay can be defined as an electromechanical relay that locks its output contacts. As the name suggests, this relay once operated locks the circuit. Locking means the circuit cannot be normalized until and unless this relay is reset.

Lockout relay works when the safety switches are closed, the resistance through them is very small. In this case, I show a 0.1-ohm resistance through the safety circuit. Since the total circuit resistance is only 10 ohms, the potential difference across the switches is only 0.24V. that way, the coil of the locking relay cannot be energized enough.

Learn more about Lockout relay here brainly.com/question/28171151

#SPJ1

explain why the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of reduced risk of heart disease

Answers

The explanation of the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of the reduced risk of heart disease is given below:

This is because the confounding variables that need to be considered are the associations are the frequency of alcohol consumption, drinking pattern shows a relationship between the pattern of drinking and different beverages.

What is a Confounding Variable?

This refers to the third variable that has an effect on both the independent and dependent variables

Hence, we can see that The explanation of the existence of these potentially confounding variables prevents drawing the conclusion that moderate drinking is the cause of the reduced risk of heart disease is given below:

This is because the confounding variables that need to be considered are the associations are the frequency of alcohol consumption, drinking pattern shows a relationship between the pattern of drinking and different beverages.

Read more about confounding variables here:

https://brainly.com/question/10863424

#SPJ1

you need to write a program that has karel put down a tennis ball if the world has dimensions of 1x1. which control structure do you need to use?

Answers

Assuming you need to write a program that has "Karel put down a tennis ball if the world has dimensions of 1x1," the control structure you should use is: C. If Statement.

The types of control structure.

In Computer programming, there are different types of control structure and these include the following:

For LoopWhile LoopIf/Else StatementIf Statement

What is an if statement?

An if statement can be defined as a conditional statement that is written by a computer programmer to handle decisions by running a different set of statements, depending on whether an expression is either true or false.

Read more on if statement here: https://brainly.com/question/18736215

#SPJ1

Complete Question:

You need to write a program that has Karel put down a tennis ball if the world has dimensions of 1x1.

What control structure do you use?

answer choices

For Loop

While Loop

If Statement

If/Else Statement

None of these

C. If statement

May I get brainiest please? :)

which of the following methods of obtaining desert lysed images can recognize and preserve text and formatting
A: a Digital camera
B: an OCR scanneR
C: clip art
D: online graphics

Answers

Answer:

B

Explanation:

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe me 4⁄5 of a dollar," laughed his cousin. "How much is that?" Pradeep asked. "You tell me!" his cousin replied. How much does Pradeep owe his cousin?

Answers

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

What is the next line?
>>> tupleA = (5, 20, 30, 40, 30)
>>> tupleA.index(30)
OO
0 1
03
02
Look at the picture

Answers

Answer:

The answer is "2"

Explanation:

Following are the modified code to this question:

tupleA=(5, 20, 30, 40, 30)#defining a list tupleA that holds multiple integer value  

print(tupleA.index(30))#defining print method that use a index method to print index value

In the above code, a list of integer variable tupleA is declared, that holds numbers, in the next step, tupleA is used with an index method, that holds a number "30", when we print its value it will return an index value that is equal to 3.

Answer:

2

Explanation:

To identify the effect in a text, you can ask yourself which question?

A. What happened?

B. Why did this happen?

C. How did the person feel?

D. Where did this happen?

Answers

Answer:

why did this happen?

Explanation:

effect means what caused it so You should ask why did this happen or (what caused it)

A. What happened? I’m sorry if this is wrong

computing is the provision of IT services on demand.
a. Mobile
O b. Utility
O c. Portable
O d. Grid

Answers

Answer:

The correct option is;

b. Utility

Explanation:

The pay-and-use or utility computing is an IT service provisioning service whereby the IT or computing service provider makes available infrastructure and other resources required for completing IT related tasks and offer charges based on the extent of usage by the customers in a model based on utility so as to maximize efficiency

Therefore, utility computing is the provision of IT services on demand

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

What is a database management program?​

Answers

Explanation:

A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

It is false that the quick access toolbar can be customized, but the ribbon can not be customized.

Based on the support website:

There are several commands in the resizable Quick Access Toolbar that are unrelated to the ribbon tab that is now shown. The Quick Access Toolbar can be moved from one of the two potential positions, and buttons that correspond to instructions can be added to the Quick Access Toolbar.Your ribbon can be customized to display tabs and commands in the order you like, hide or reveal the ribbon, and conceal instructions you don't use frequently. A customized ribbon can also be imported or exported.

Learn more about quick access toolbar https://brainly.com/question/17441291

#SPJ4

True or false binary code is a base ten system

Answers

Answer:

false it is a two base system

3 advantages

of building in SDLC​

Answers

Answer:

better management control over the entire development project transparency and visibility of all process. clarity of requirements

what is a thoughtware​

Answers

Explanation:

plzz write it and plzzzz Mark me brainliest

A method of changing unproductive thoughts into constructive ones is called

meditation.
visualization.
positive self-talk.
deep breathing.

Answers

A method of changing unproductive thoughts into constructive ones is called meditation. Hence, option A is correct.

What is unproductive thoughts?

An inclination or habit is a mindset that doesn't offer any benefits, effects, or results. Such a mindset pulls the client's focus away from his goals, fulfillment, and empowerment. Negative thoughts may be part of an unproductive mindset.

Overthinking, sometimes referred to as rumination, is when you keep returning to the same idea or event in your mind until it starts to interfere with your life. The two primary forms of overthinking are worrying about the future and brooding on the past.

People who have previously faced difficulty for which they were unprepared may get into the habit of catastrophizing.

Thus, option A is correct.

For more information about unproductive thoughts, click here

https://brainly.com/question/16875515

#SPJ6

Answer:positive self talk

Explanation:

1) which of the following is not a characteristic of valuable information?

A) irrelevant B) Up-to-date

C) Accurate D) Reliable

2) Which of the following is another name for primary storage?

A) CPU B) ROM

C) RAM D) CD drive

3) One of the following is smallest unit of memory?

A) Bit B) Byte

C) kilobyte D) megabyte

Answers

Answer

1. A

2. C

Explanation:

1. Information that is irrelevant is not a characteristic of valuable information.

2. Another name for primary storage is RAM (Random Access Memory).

3. Bit is the smallest unit of memory.

Computers are electronic devices that help process and store information. They also help in making our lives easier with their fast computational ability and process.

Computers have become one of the most important devices in our daily lives. This electronic device is also made up of different parts that all play a huge part in how well the device functions. Random Access Memory or RAM is the primary storage of a computer. And in accessing any information, irrelevant details are not part of valuable information. And in terms of memory, bit is the smallest unit, followed by byte, kilobyte, megabyte, gigabyte, and so on.

Thus, the correct answers are options A), C), and A).

Learn more about computers here:

brainly.com/question/23781325

What is the "middle" value for the "vertical-align" property based on?
a) a line's x-height
b) the height of the age
c) the shortest element on a line
d) the number of elements on a line

Answers

Answer: a) a line's x-height.

Explanation: The middle of the parent element is calculated by taking the x-height, halving it, and adding it to the baseline. Therefore, the "middle" value for the "vertical-align" property must be also based on the line's x-height.

if you’re using aptana to edit an html file, the easiest way to test it is to group of answer choices click on the run button in aptana’s toolbar type it’s path and filename into your browser’s address bar use the browser’s open or open file command in the file menu find it in the windows explorer and double-click on it

Answers

If you're using Aptana to edit an HTML file, the easiest way to test it is to click on the Run button in Aptana's toolbar.

Making web application development tools for use with various programming languages is the business of Aptana, Inc. Aptana Studio, Aptana Cloud, and Aptana Jaxer are the company's three primary products.

Studio Aptana. An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

Aptana Studio now supports Ruby on Rails, PHP, Python, Perl, Adobe AIR, Apple iPhone, and Nokia WRT thanks to additional plugins (Web Runtime).

Learn more about toolbar:

https://brainly.com/question/25047693

#SPJ4

Other Questions
Titus works at a hotel. Part of his job is to keep the complimentary pitcher of water at least half full and always with ice. When he starts his shift, the water level shows 8 gallons, or 128 cups of water. As the shift progresses, he records the level of the water every 10 minutes. After 2 hours, he uses a regression calculator to compute an equation for the decrease in water. His equation is W 0.414t + 129.549, where t is the number of minutes and W is the level of water. According to the equation, after about how many minutes would the water level be less than or equal to 64 cups? 150 minutes160 minutes170 minutes180 minutes HLEPPPPPPPPPP ME PLEASEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE A company charges $7 for a T-shirt and ships any order for $15. A school principal ordered a number of T-shirts for the school store. The total cost of the order was $1,520. Which equation can be used to find the number of shirts ordered? Write the equation of the line in slope-intercept form that has a slope of 3 and passes through (5, -1) What Article of the Constitution describes rules for Congress such asminimum age term limits? whats the answer giving brainliest :)>. South Carolina took over Fort Sumter because _____________________ Write one sentence in Spanish to describe something that was being done because of hurricanes.Use one progressive tense verb in the preterite tense, or imperfect tense. pls answer with real answers only thank you (3) How does Dachina's coming-of-age ritualsymbolize the milestones she has reached on herpath to adulthood? solve for x: 4/5x + 5 = 9 2) What were the long-term impacts of the Lewis and Clark Expedition? The ration of red marbles to white ones is 13 to 12. If there are 3,081 red marbles how many white ones are there? A cable television provider charges $75 for installation and $39.96 per month for a basic entertainment package. a satellite television provider offers free installation and charges $13.32 per month for service for each television. your neighbor subscribes to the cable provider the same month you subscribe to the satellite provider. after how many months is your neighbor's total cost the same as your total cost when you own three televisions? The speaker doesnt want to be a ""Somebody."" Explain why she believes that being a ""Somebody"" is overrated. Cite specific lines in your answer. Calculate the area of this triangle anyone have a amazon code that works. i will make a deal if someone gives me the code while international trade is as logical as interstate trade, some nations restrict imports of certain goods for a variety of reasons. the united states recently restricted the import of fresh tomatoes from mexico. why did the united states restrict the imports of tomatoes? Given f(x) = -x +6, Evaluate f(x) for X= -1 and 3 and 5Range: What is the meaning of "Nonviolence seeks to defeat injustice, not people". it's one of the six principles of nonviolence, said by Martin Luther King Jr.