1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
9

Write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
8 0

Answer:

I remember before the corona virus we used to do math at school

You might be interested in
People are not interested in what you do _____. I think, more and more, they're not even really interested necessarily in how yo
Ymorist [56]

Incomplete question. However, I inferred you are referring to the best word that likely completes the blank space.

Answer:

<u>or don't do;</u>

Explanation:

So, this statement could rightly read;

"People are not interested in what you do<u> or don't</u>. I think, more and more, they're not even really interested necessarily in how you look on paper, like a...."

3 0
3 years ago
What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
Katena32 [7]
Small programs stored on the harddrive that provide basic functionality for he devices listed would be called Hardware Drivers.
I hope this helps!
5 0
4 years ago
To copy and paste from an excel workbook to a word document, you must first
Firlakuza [10]
Select the cells to copy. Then push CNTL+C to copy them. Next, click the cells you want to paste in. Finally, push CTRL+v to paste
5 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Which routine is configured to execute first when the program runs?
tester [92]
It's D because of ok
4 0
3 years ago
Other questions:
  • What does CSS stand for?
    8·2 answers
  • What is the simplest way to permanently get rid of an unwanted file? A. Go to the Start menu and then delete the file. B. Erase
    5·1 answer
  • The keyboard preferences pane includes a list of keyboard shortcuts.
    8·1 answer
  • Difference between query and filter<br><br>​
    12·1 answer
  • Gmod how to make someone admin on a lan server
    6·2 answers
  • Generate a row vector b=[1 2 3 4 5 6 7 8 9 10] using linspace function, give the commands and show print-screen of the result.
    11·1 answer
  • Which user characteristic may not be used to change keyword bids in adwords?:?
    11·1 answer
  • Write the Stats method record that takes a test score and records that score in the database. If the score already exists in the
    15·1 answer
  • What defines interactive media? The user must play a role in writing the content of the media. The user must do something that d
    6·2 answers
  • A(n) ________ HTML tag is used to mark information about the page.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!