1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
7

If you want to refine your google search results by date which option should you use

Computers and Technology
2 answers:
jeka57 [31]3 years ago
7 0
You should use the Tools option and then click Anytime and then select  custom range
Ad libitum [116K]3 years ago
5 0

the correct answer is : Advanced search

You might be interested in
1. Very short questions.(any four) 14)<br>a. Write down the working principle of a computer.​
Oxana [17]

Answer:

The answer is below

Explanation:

Computer System is widely known for its ability to perform its functions faster by giving out information.

The computer system operation follows certain principles, some of which are:

1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.

2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system

3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.

4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.

6 0
3 years ago
What is the point of having bullets points in a text box
Ludmilka [50]
You should have bullets in a text box in case you have a list of stuff. For example:

Computer Parts

.Tower

.Monitor

. Mouse

.Printer


3 0
3 years ago
Whats the best strategy for avoiding ATM fees?
natulia [17]
You hack the atm that's how
3 0
3 years ago
Read 2 more answers
Write a function addUpSquaresAndCubes that adds up the squares and adds up the cubes of integers from 1 to N, where N is entered
avanturin [10]

Answer:

All functions were written in python

addUpSquaresAndCubes Function

def addUpSquaresAndCubes(N):

    squares = 0

    cubes = 0

    for i in range(1, N+1):

         squares = squares + i**2

         cubes = cubes + i**3

    return(squares, cubes)

sumOfSquares Function

def sumOfSquares(N):

    squares = 0

    for i in range(1, N+1):

         squares = squares + i**2

    return squares

sumOfCubes Function

def sumOfCubes(N):

    cubes = 0

    for i in range(1, N+1):

         cubes = cubes + i**3

    return cubes

Explanation:

Explaining the addUpSquaresAndCubes Function

This line defines the function

def addUpSquaresAndCubes(N):

The next two lines initializes squares and cubes to 0

    squares = 0

    cubes = 0

The following iteration adds up the squares and cubes from 1 to user input

    for i in range(1, N+1):

         squares = squares + i**2

         cubes = cubes + i**3

This line returns the calculated squares and cubes

    return(squares, cubes)

<em>The functions sumOfSquares and sumOfCubes are extract of the addUpSquaresAndCubes.</em>

<em>Hence, the same explanation (above) applies to both functions</em>

7 0
3 years ago
Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
RUDIKE [14]
The answer is 'D', as obvious as it seems...
4 0
2 years ago
Other questions:
  • Assume the secret key is: (1, 2, 3, 4) -&gt; (3, 1, 4, 2); assume the plaintext THEYLOVEIT. If the sub-block length is 3, what i
    6·1 answer
  • The ease of travel in the twentieth century played a role in the advancement of medicine. Based on this lesson, which statement
    5·2 answers
  • In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
    6·1 answer
  • Which one of these are a valid IPv4 address? Check all that apply.
    9·1 answer
  • Explain In your own words what a motherboard is and it’s functions?
    10·2 answers
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • What do you think is the most fascinating aspect of the Internet
    5·2 answers
  • , , ,g d,t ,dt m,dt ymtd
    9·1 answer
  • True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
    15·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!