1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
11

Google is the most popular:

Computers and Technology
2 answers:
Dvinal [7]3 years ago
7 0
Google is the most popular C) Search engine.

  Explore for erudition regarding an individual or anything at the Internet by the usage of the search engine  ---> Google.

Fynjy0 [20]3 years ago
7 0
C. Google is the most popular Search Engine.
You might be interested in
Technology is often discovered by accident
polet [3.4K]

true. mots technology was found be accident

5 0
4 years ago
In Web design, What kind of tag is referred to as fixed ?<br>​
Tpy6a [65]

Answer:

Most HTML tags are fixed

Explanation:

There are various kind of technology one can use for designing web application. A web designer should know HTML, CSS and other basic building block of web development.

HTML meaning hypertext markup language is used to define the basic structure of a web page . HTML has tags which are used to declare the contents on the web page. The tags includes anchor(<a>), paragraph tag(<p>),header tag(<h1>).

CSS which is known as Cascading style sheet describes the presentation of the web pages.

Other tags in HTML includes <img>, <link>, <ul>  etc and generally this tags are HTML tags which are fixed for a particular kind of job . For example you can't use an image tag <img>   to enclose video instead you use a video tag <video> tag. The header tag <h1> cannot be represented like a paragrapgh tag<p> on the web page. The both of them serve specific purpose and are fixed.  

7 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
What phrase best describes the overall structure of the<br> passage
creativ13 [48]

Answer: The one that gives you more vibe that its correct.

Explanation:

3 0
3 years ago
Write a Python program which asks a user for a word and performs letters manipulation. If the word is empty, the program should
never [62]

Answer:

The program is as follows:

word = input("Enter a word: ")

if word:

   if len(word) <= 4:

       word = word[::-1]

   else:

       word = word[0]+word[1]+word[-2]+word[-1]

   print(word)

else:

   print('empty!')

Explanation:

This gets input for word from the user

word = input("Enter a word: ")

If input is not empty

if word:

This checks if the length is less than or equal to 4 characters

   if len(word) <= 4:

If yes, this reverses the word

       word = word[::-1]

If otherwise,

   else:

This gets the first, second, second to last two characters

       word = word[0]+word[1]+word[-2]+word[-1]

Print the new string

   print(word)

Print empty, if input is empty

<em>else: </em>

<em>    print('empty!')</em>

8 0
3 years ago
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Computer program allowing the computer to communicate<br> with a hardware device
    13·1 answer
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • Question 4 of 20
    5·1 answer
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • Were does igneous rocks cool?
    9·1 answer
  • What is the disadvantage of server based network?
    7·2 answers
  • Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi
    11·2 answers
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • How can you say that a painting is real? ​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!