1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
4 years ago
15

One of the prominent movies released in the 1950s is

Computers and Technology
2 answers:
MrRa [10]4 years ago
3 0
Vertigo was the #1 movie of that time
Alex787 [66]4 years ago
3 0

Answer:

yes,  virtigo was first prominent movies released in 1950s

You might be interested in
________-generation languages use symbols and commands to help programmers tell the computer what to do.
Molodets [167]

Answer:

Third Generation Language

Explanation:

it is a high-level programming language such as FORTRAN, COBOL, BASIC, Pascal and C which uses symbols and commands that help programmers with what to do on their systerm , some of these symbols are :(colon), -(hyphen), add (+).

6 0
4 years ago
Read 2 more answers
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
How to give answer like this?????
creativ13 [48]

Answer:

possibly he made an image in the photo or this

Explanation:

\large\boxed{\mathfrak{hi}}

8 0
3 years ago
How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
Cloud [144]
The yearly salary is xx,xxx just add some stuff in front maybe in back
6 0
4 years ago
What are the methods or permissions needed to view the passwords for linux and unix?
Greeley [361]
Anybody can read encrypted passwords, they can't decipher them they're encrypted with a one way encryption algorithm.
4 0
4 years ago
Other questions:
  • If an employee who needs eye protection wears prescription lenses he or she should
    14·1 answer
  • What is a good technological design?
    13·1 answer
  • What would you need to install if you have an app that is incompatible with your current operating system?
    13·1 answer
  • Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
    5·1 answer
  • Why is printer an output device​
    14·2 answers
  • Hey you know Python? Could you help me, please? It's for my Final please help me SOS.
    8·1 answer
  • Select the correct answer.
    14·1 answer
  • What is another name for repetition in programming?
    11·1 answer
  • BUYING A NEW COMPUTER
    15·1 answer
  • Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!