1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
9

WILL MARK YOU BRAINLIEST :

Computers and Technology
1 answer:
valkas [14]3 years ago
3 0

CodeHS is an interactive online learning platform offering computer science and programming instruction for schools and individual learners.

CodeHS is focused on spreading access to and knowledge of computer science by offering online instructional materials supported by remote tutors.

Explanation:

Downloading an image from a website on the internet.

  • Right-click the image.
  • Choose the command Save Picture As. The command might be different in browsers other than Internet Explorer.
  • Use the Save Picture dialog box to find a location to save the picture. You can rename the picture as it's saved to your computer's storage system
  • Click the Save button.

Download an image of Karel the dog from the URL

  • Create a folder in your laptop
  • Place your text file of images URL in the folder.
  • cd to that folder.
  • Use wget -i images.txt.
  • You will find all your downloaded files in the folder.

How your computer finds the CodeHS server, requests information from the server, and receives it.

  • When you enter an URL into the address bar of browser, browser will send the domain to a server call DNS to convert the domain into IP address.
  • For example: google dot com will be convert into 113.171.253.224
  • Next, the browser will send your request to that IP.
  • All your sent data will be divided into packages, each package contains your IP address.
  • That is the reason why server know who it will send the response.
You might be interested in
The local library dealing with a major computer virus checked its computers and found several unauthorized programs, also known
Dvinal [7]

Answer:

malware

Explanation:

7 0
2 years ago
Read 2 more answers
Which of the following accurately describe the
Ronch [10]

Answer:

I can get a few months ago but the other use of the way you can you are you have a few weeks ago

3 0
2 years ago
Read 2 more answers
1.Write the Qbasic program to find sum of any 10 different numbers.
dybincka [34]

Answer:

1.

DIM myArray(10) as INTEGER

LET A = 0

FOR I = 1 TO 10 STEP 2

INPUT “INPUT NUMBER”; myArray(i)

LET A = A + myArray(i)

NEXT  

PRINT A

END

2.

REM PROGRAM FOR CALCULATING THE SIMPLE INTEREST

CLS

INPUT “INPUT THE PRINCIPAL”; P

INPUT “INPUT THE TIME”; T

INPUT “INPUT THE RATE”;R

SI = P* T * R / 100

PRINT “SIMPLE INTEREST =”; SI

END

Explanation:

Please find the respective programs in the answer section.

4 0
3 years ago
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
Contact [7]
The answer is infrastructure
7 0
2 years ago
The incident results in huge losses of revenue as a result their mobile app service is withdrawn. Investigators discovered a vul
zlopas [31]

Answer:

The attackers used the code injection

Explanation:

<em>Because, the HMTL5 allows data and code to be mixed together, making code injection attacks possible. </em>

6 0
3 years ago
Other questions:
  • Assume you have a project with seven activities labeled A-G (following). Derive the earliest completion time (or early finish-EF
    15·1 answer
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • Which of these is not one of the main parts of an email
    9·1 answer
  • Why is compression a "hard problem" for computers? Draw on your own experience compressing text with the text compression widget
    12·1 answer
  • The database must be carefully planned to allow useful data manipulation and report generation.
    10·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • If you have 60fps on your laptop tell me one way you can go to 240fps
    14·2 answers
  • Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against f
    8·1 answer
  • Please help with question
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!