1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
10

Who are the key players in the internet

Computers and Technology
1 answer:
Anna007 [38]3 years ago
4 0
Gamers my dude, dank memes are also the internet's finest minds
You might be interested in
Zoe wants to use an image file that will allow her to preserve all of the original
liberstina [14]

Answer:

DOC FILES OR MP3s

Explanation:

DOC FILES AND MP3s BEACUSE THEY HAVE BETTER STORGE TO HOLD THE IMPORTANT FILES AND WORK THAT U DO AND SAVE

8 0
3 years ago
How was data put into the Tabulating Machine?
andrew-mc [135]

How was data put into the Tabulating Machine?

Answer:

punch cards

8 0
3 years ago
Create a function named first_a that uses a list comprehension. The function will take a single integer parameter n. Find every
aivan3 [116]

Answer:

def first_a(n):

   lst1 =[x for x in range(1,n+1)if x%6==0 or x%11 ==0]

   print(lst1)

Explanation:

Above is a function in python programming language. We have used list comprehension to check numbers that are multiples of 6 or 11 in a range.

When this function is called it will receive an argument (n) of type integer, a range will then be generated from 1 to n+1 since n is inclusive. The modulo operator is used to determine is a value is a multiple of 6 or 11, since their multiples will evaluate to 0

3 0
3 years ago
When you open a program, the hard drive___
Papessa [141]

Answer:

When you open a program, the hard drive <u>Registers the program and runs the program accordingly. </u>

I hope this helped!

3 0
3 years ago
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
Other questions:
  • How many homes can be warmed by one bugatti
    11·2 answers
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • Which of the following statements is true?
    12·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • Discuss two basic types of monitors CRT and LCD give me in short ​
    9·2 answers
  • Whats wrong with my code for .addEventListener
    11·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • Can someone please give me timetable managment system with data structures in java?
    11·2 answers
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!