1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
12

What was Bill Gates purpose for starting a business?

Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
6 0

Entrepreneur and businessman Bill Gates and his business partner Paul Allen founded and built the world's largest software business, Microsoft, through technological innovation, keen business strategy and aggressive business tactics. In the process, Gates became one of the richest men in the

You might be interested in
Which of the following might be appropriate to be created as a constant variable?
jasenka [17]

Answer:

Number of feet in a mile

Explanation:

In this problem, we need to find an option that to be created as a constant variable.

In option (a) "number of feet in a mile".

As 1 mile = 5280 foot

The number of feet in a mile is constant in every condition.

In option (b), (c) and (d)

number of people inside a store , current grade in a class , score in a football game are no fixed. It is not created as a constant variable.

Hence, the correct option is (a).

7 0
3 years ago
What do devices provide? A.data to be processed B. Software code C.text and images only D.results of processing.
VikaD [51]

A is the correct answer!

8 0
3 years ago
What are the two contextual tabs that appear when working with PivotTables?
Nutka1998 [239]

Answer:

<u>D.Analyze and Design</u>

8 0
3 years ago
Read 2 more answers
Proxy manipulation occurs when a false dhcp server that can provide ip address configuration leases for a unique subnet and defi
maksim [4K]
True. A hacker in proxy manipulation may host a false proxy server or better known as a rogue DHCP and is able to modify the proxy settings on a client to redirect traffic to another system. The hacker is able to reconfigure a client’s proxy configuration.




8 0
4 years ago
The theory of logic set the foundation for what aspect of computing today?
xeze [42]
Boole's theory of logic set the foundation for searching
6 0
4 years ago
Other questions:
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
    6·2 answers
  • Which of the following statements is true regarding how Wireshark works? a. Where packets are captured and how they are captured
    10·1 answer
  • 50 points!!!!!
    9·2 answers
  • A domain name is used to: *
    15·1 answer
  • Select all the correct answers.
    14·2 answers
  • Suppose that the first goal in a GP problem is to make 3 X1 + 4 X2 approximately equal to 36. Using the deviational variables d1
    15·1 answer
  • Education leads to higher wages lower unemployment.* True or false
    5·1 answer
  • Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
    11·1 answer
  • Imagery functions as a coding system to help individuals acquire movement patterns. this describes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!