1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
10

Crees que el uso del internet ha mejorado nuestra vida o somos esclavos de ella​

Computers and Technology
2 answers:
Ilya [14]3 years ago
3 0

Answer:

Yo creo que él internet a mejorado nuestra vida pero también nos a embobado porque lo que hacemos mas es buscar cosas que no aportan a tu vida y no cosas que nos ayuden en la vida.

olchik [2.2K]3 years ago
3 0

Answer:

Yo creo que él internet a mejorado nuestra vida pero también nos a embobado porque lo que hacemos mas es buscar cosas que no aportan a tu vida y no cosas que nos ayuden en la vida.

You might be interested in
Karen is learning about searching the Internet and collaborating with other people online. ​ ​ Karen has found and removed all W
Andreyy89

Answer:

She should:

Make sure they are well-known.

Understand if they are safe or not.

Be able to find out if it is a phony website.

Find out as much as she can about the website first.

Explanation:

1. If they r not well-known they could be fake and steal personal/private info from you.

2. If they r not safe they could put her in danger if she gives out private info like her address.

3. If it is a phony website it would be a waste of time.

4. Finding out as much as possible from the website is important so that she can make sure it fits her needs and does not hide anything from her.

8 0
3 years ago
How would a designer interpret the word denier?
xxMikexx [17]

Answer:Denier is a unit of measurement that is used to determine the fiber thickness of individual threads or filaments used in the creation of textiles and fabrics. Fabrics with a high denier count tend to be thick, sturdy, and durable. Fabrics with a low denier count tend to be sheer, soft, and silky.

Explanation:

idk if this is right.

7 0
3 years ago
Read 2 more answers
For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
Paul [167]

Answer:

(a): The base case: if(n<1)

(b): The recursive statement: recur(n / 5)

(c): Parameter 10 returns 7

Explanation:

Given

The above code segment

Solving (a): The base case:

The base case is that, which is used to stop the recursion. i.e. when the condition of the base case is true, the function is stopped.

In the given code, the base case is:

<em>if(n<1)</em>

Solving (b): The recursive statement:

The recursive statement is the statement within the function which calls the function.

In the given code, the recursive statement is:

<em> recur(n / 5)</em>

<em />

Solving (c): A call to recur() using 10

The base case is first tested

if (n < 1); This is false because 10 > 1

So, the recursive statement is executed

<em>recur(n/5) +2=> recur(10/5)+2 => recur(2)+2</em>

2 is passed to the function, and it returns 2

if (n < 1); This is false because 2 > 1

So, the recursive statement is executed

<em>recur(n/5) +2=> recur(2/5)+2 => recur(0)+2</em>

2 is passed to the function, and it returns 2

<em />

if (n < 1); This is true because 0 < 1

This returns 3

So, the following sum is returned

Returned values = 2 + 2 + 3

Returned values = 7

3 0
3 years ago
You can create a ____ partition to hold files that are created temporarily, such as files used for printing documents (spool fil
LuckyWell [14K]

Answer:

The answer is "Option C".

Explanation:

The /var method can also be used to override the values of the current variable, or generate, and assign values to new variables. It generates a local variable, that can be modified via the -g switch, and other choices are not correct, which can be described as follows:

  • In option A, It is incorrect because it uses to store temporary data file.
  • In option B, It is used by a system administrator, that's why it is incorrect.
  • In option D, It isn't correct because it prints a warning message.
4 0
3 years ago
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
Other questions:
  • What is the last step when creating a maintenance schedule? develop a reminder system read the manuals log the maintenance compl
    6·1 answer
  • A is the smallest unit of application data recognized bysystem software.
    12·1 answer
  • To put out a minor engine fire, use
    12·1 answer
  • Write a function (funception) that takes in another function func_a and a number start and returns a function (func_b) that will
    7·1 answer
  • What is a complex instruction set computer chip? Multiple Choice Performs all arithmetic operations (for example, addition and s
    6·1 answer
  • Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D.
    7·1 answer
  • What is c also write it's features
    8·2 answers
  • Which best explains a password attached to a document?
    7·1 answer
  • Write a program that declares an array named myArray with 8 components of the type int. Initialize the array to 8 values that th
    6·1 answer
  • After you create a pie chart, you can move it to its own chart sheet.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!