1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
12

HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE

Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
8 0

Answer:

c

Explanation:

Salsk061 [2.6K]3 years ago
8 0

Answer:

C. Natural language

Explanation:

this is because the search query uses normal letters and phrases without attaching codes

You might be interested in
Table Setting in any occasion can add to the beauty and significance of the event. It may
Rudiy27

Answer:

HMMMM IM THINKING HMMMMM

Explanation:

7 0
3 years ago
Explain 2 ways in which data can be protected in a home computer??
Nonamiya [84]

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

3 0
3 years ago
Which is many many years of vot in nepal.​
Butoxors [25]

Answer:

18 yrs

Explanation:

3 0
3 years ago
What does a computer use to determine if an ip address of another computer is on the same network or a different network?
Radda [10]
It uses it's routing table. If the destination is on the same network, it transmits directly via the MAC address. If the destination is on another network, it transmits to whatever the table says for that network. For desktops it's usually a default address of the router on the computer's network.
6 0
3 years ago
In an array list the time complexity of the remove function is identical to the time complexity of the ____ function.
yaroslaw [1]

Answer:

C. is Full

Explanation:

In an array list the time complexity of the remove function is identical to the time complexity of the ''isFull'' function.

3 0
4 years ago
Read 2 more answers
Other questions:
  • A network manager prevents users accessing certain websites. She does this by setting up:
    7·1 answer
  • What has prompted schools to add Internet activities in their academic integrity policies?
    6·2 answers
  • . Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
    10·1 answer
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • How did people find the first ever piece of tech?
    6·1 answer
  • Create a class that acts as a doubly linked list node. it should contain all the required data fields, at least 1 constructor, a
    7·1 answer
  • Develop Java methods to perform the following operations on an unordered list (using linked lists). What is the complexity of ea
    15·1 answer
  • In a study of 1228 randomly selected medical malpractice​ lawsuits, it was found that 856 of them were dropped or dismissed. Use
    13·1 answer
  • What does a wireless LAN (WLAN) act as to a wired network?
    12·1 answer
  • write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!