1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
13

Please help ASAP, will mark brainliest!

Computers and Technology
1 answer:
sp2606 [1]3 years ago
3 0

Answer:

Stick to concrete nouns

Explanation:

The best technique to improve the web search result is that search with the help of keywords. These keywords help in searching the required results from search engines.

The keywords are actually nouns. Noun is name of object, place or person. So by using nouns we can search out required results.

For example

If we want to search about some persons bibliography, we use his name in our search. His name is an example of noun.

You might be interested in
Variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have aft
snow_lady [41]

Answer:

10

Explanation:

If index is greater than or equal to 2, accessPoints will increase by 10 even if accessValid is false because the if statement states that if index is greater than or equal to 2 OR accessValid is true. The if statement gets executed if either expression is true, and index is greater than 2 because index has a value of 4.

8 0
3 years ago
Does anyone know how to snip or like screenshot the screen?
Rashid [163]

Answer:

yes it is on pc shift command 3

Explanation:

thats how i do it

8 0
3 years ago
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
2 years ago
Who wrote the first computer program after floppy disc and dos
s2008m [1.1K]

<em>Alan Shugart assigned David L. Noble to lead the development of "a reliable and inexpensive system for loading microcode into IBM System/370 mainframes" using a process called Initial Control Program Load (ICPL). </em>

7 0
3 years ago
A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do
Anton [14]

Answer:

A. True.

Explanation:

Programming languages are computer based languages used to pass instructions or task that can be interpreted to machine language, which can be understood by the computer system. Low level programming language and high level programming language are the two categories of program languages.

Low level languages use low level commands. They use processor instruction sets and primitive opcodes for their instruction syntax. Example of a low level language is Assembly language.

High level languages are English based and more complex in its compilation.

8 0
3 years ago
Other questions:
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    15·1 answer
  • Webster defines risk as "the possibility of loss or injury". Therefore, driving a motor vehicle is a risk.
    12·1 answer
  • *hacked*
    12·1 answer
  • How do you use a iPad when it has a password ?
    9·2 answers
  • the technique of blocking some parts of a photograph to emphasize (or draw attention to) another part of the same photograph is
    8·1 answer
  • Where do you define parameter variables?
    14·1 answer
  • List out two ways to execute the script.​
    12·2 answers
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
  • It takes Mike 18 minutes to finish reading 4 pages of a book. How long would it take for him to finish 30 pages ?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!