1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
2 years ago
8

Robert's got a quick hand

Computers and Technology
2 answers:
Alina [70]2 years ago
6 0
verry
good
song
love
it
Pie2 years ago
3 0
ALL THE OTHER KIDS WITH THE PUMPED UP KICKS YOU BETTER RUN BETTER RUN ! FASTER THAN MY GUN !
You might be interested in
The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
kenny6666 [7]

hard drive is wht the awnser is

8 0
2 years ago
The first mechanical computer design in by Charles Babbage was Called​
White raven [17]

Answer:

<h2>Analytical Engine</h2>

Explanation:

Analytical Engine, generally considered the first computer, designed and partly built by the English inventor Charles Babbage in the 19th century (he worked on it until his death in 1871).

7 0
3 years ago
Read 2 more answers
Special computers, called __________, keep databases of IP addresses and their corresponding names
vitfil [10]
Name servers.
-----------------------------------------------------------
4 0
3 years ago
What is the relationship between optical drives and WORMs?
Effectus [21]

Answer:

When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.

Explanation:

Good luck

6 0
3 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Other questions:
  • Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl
    15·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • Vhich economic impact of computers was mentioned in this lesson?
    6·1 answer
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • As part of a team, you are assigned to create a financial report. One of your tasks is to put the pieces together as other team
    5·1 answer
  • Debug the recursive reverseString method, which is intended to return the input String str reversed (i.e. the same characters bu
    13·1 answer
  • Write a recursive function num_eights that takes a positive integer pos and returns the number of times the digit 8 appears in p
    8·1 answer
  • Which of the following is the most reliable way to check the accuracy of a website?
    13·1 answer
  • When you hear the word “stress” what does it mean to you? How does stress affect you and what do you do to cope with stress
    9·1 answer
  • HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!