1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
8

Does You tube have a You tube channel? and does Netflix have to pay for their own account???

Computers and Technology
2 answers:
Sergeu [11.5K]3 years ago
7 0

Answer:

No I don't have a you tube channel and bett what is it??

Yes you have to pay for Netflix and if you are referring to the owners I don't think they do : P

Explanation:

defon3 years ago
3 0

I don't understand the You  tube part, but uh yeah???

You might be interested in
Use the drop-down menus to correctly complete these sentences about common data types.
steposvetlana [31]

Answer: Boolean, alphanumeric string, integer, floating-point number

Explanation: cuz I got it right

4 0
3 years ago
Which is an example of the operation of a game?
SVEN [57.7K]

Answer:

D.  

The player uses a joystick to control the character.

Explanation:

The MEANING of operation is: "The fact or condition of functioning or being active."

This explains that the answer is D because you are using the joystick to control the character. Hope the helps.

6 0
3 years ago
Read 2 more answers
Which of the following need to be assessed during unit testing?
diamong [38]
E) both C and D Erro handling and execution paths
8 0
3 years ago
Operations that run in protected mode must go through which of the following before they can access a computer’s hardware? A. Ke
HACTEHA [7]

Answer:

Option A (Kernal) seems to be the right answer.

Explanation:

  • A Kernel appears to be the central component of such an OS. This handles machine as well as hardware activities, including most importantly storage as well as CPU power.
  • This manages the majority of the initialization as well as program input/output requests, converting them into CPU data-processing commands.

The other given option are not related to the given circumstances. So that option A would be the right answer.

3 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Other questions:
  • Pleas help I will give brainiest
    8·2 answers
  • Emilio is reviewing the data he collected from historical records about immigration in the united states. He decides to create a
    5·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • What is the square root of 1600 and 36 ?​
    6·1 answer
  • List the components of a typical operating system and summarize the role of each in a single phrase.
    6·1 answer
  • Write a function named last_digit that returns the last digit of an integer. For example, last_digit(3572) should return 2. It s
    5·1 answer
  • A soft news story and a feature story are the same thing.<br> O True<br> O False<br> HELLPP ASSAAAP
    12·2 answers
  • We have constructed a Player Class for you. Add the following: public static variable: int totalPlayers Static variable should b
    8·1 answer
  • Show me how to create an argument essayshow me how to create an argument essay ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!