1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
6

List the names of 3 computer scientists

Computers and Technology
2 answers:
kap26 [50]3 years ago
5 0

Answer:

1. Ellon Musk

2. Larry Page

3. John Hopcroft

Hope that helps!

ikadub [295]3 years ago
4 0

Hi there! Hopefully this helps!

------------------------------------------------------------------------------------------------------

1. Barbara Liskov.

2. Carl Sassenrath.

3. Larry Page.

You might be interested in
_________ is the start up sequence a computer conducts.
Travka [436]

Answer:

Booting

Explanation:

Booting is the start up sequence a computer conducts when it is being turned on. The booting is done by the operating system. The booting process is usually started when a hardware on the computer is pressed or by a software command. For a windows computer, the BIOS is used to start the booting sequence. These boot sequence is called boot order or BIOS boot sequence.

6 0
3 years ago
The array mycats is an 8 element array of type kitty that has already been declared and initialized. write the expression(s) in
Basile [38]
Console.log(mycats[3])
5 0
3 years ago
What are some ways to find out what skills you need to develop at work? Check all of the boxes that apply.
Anarel [89]

Answer:

Attend traings

Explanation:

Because if you do you can learn diffent waay to do it and choose your way that you like.

ANd do not obseve poeple who has it easy  

7 0
3 years ago
Read 2 more answers
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
true or false: for most queries, the user location changes our understanding of the query and user intent.
Kipish [7]
The answer is true because I don't know
4 0
3 years ago
Other questions:
  • True or false? It is just too challenging to have different password for every
    12·1 answer
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Grooves and polished surfaces on desert pebbles are most likely caused by
    10·1 answer
  • What is the term used when a password is obtained through tricking a user into giving it to another party?
    15·1 answer
  • When using the Internet, it is important to know the validity of web page you are using. How can you know if the information is
    5·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
  • Choose the best collection for each situation.
    8·1 answer
  • Please help me plss! PLS​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!