1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
12

Does downloading from mega connect someone to your computer

Computers and Technology
1 answer:
lesantik [10]3 years ago
4 0

Answer:

no

Explanation:

click on the picture to make it bigger

You might be interested in
Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
tekilochka [14]

I would bring it back since it’s not working. No way would I spend hard earned money on something that doesn’t work.

Hope this helps.

7 0
3 years ago
Read 2 more answers
You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
german

The statement that completes the query is: bytes / 1000 AS kilobytes

<h3>SQL (Structured Query Language)</h3>

This is the language that is used to retrieve, update, and store data in the database.

<h3>Columns</h3>

From the question, we have the following table columns

  • track_id
  • track_name (name of the music track)
  • composer
  • bytes (digital storage size of the music track

To retrieve data from the bytes column, we make use of:

SELECT bytes ......

From the question, we understand that this column should be divided by 1000, and the AS command should be used.

So, the query becomes

SELECT bytes / 1000 AS kilobytes .....

Hence, the statement that completes the query is: bytes / 1000 AS kilobytes

Read more about database at:

brainly.com/question/24223730

5 0
2 years ago
What is sent back after you sent FAFSA
MrRa [10]
FAFSA will send you back a SAR (Student Aid Report). They will send you an email giving you instructions on what to do what not to do. Which will be sent to you in a week. Then they will decide if the application is Approved or complete and rejected.
8 0
3 years ago
You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
Helen [10]

Answer:One of the most interesting comments regards 'stemming': "Some of the search engines offering wildcard search also support what is called "stemming." That means they will find terms like "singing" even if you only enter "sing." This also means you may not need to use a wildcard symbol."

Explanation:

3 0
3 years ago
Read 2 more answers
A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
prisoha [69]

In Python, assume that a file containing a series of integers is named numbers.txt and exist on the computer's disk. Write a program that reads the entire numbers store in the file and calculates their total.

Here is what I have written but it does not run:  

def. main():

   out file=open('numbers.txt','r')

   temp=outfile.readline()

   total=0

   while temp!='':

       t=int(temp)

       total=total+i

       temp=outfile.readline()

       outfile.close()

       print('Total sum is:',total)

main()

Text file is a file named numbers.txt with the numbers 1-50 in it

Learn more:

  • The sum of three consecutive integers is 186. what are the integers

        brainly.com/question/1768254

Keywords: python, integers, computer, numbers, program

6 0
3 years ago
Read 2 more answers
Other questions:
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • Vhat is output by the code below?<br><br> PLEASE HELP!! TIME LIMIT!!
    5·1 answer
  • Hugh is giving an informative speech about U.S. Senate election campaigns. Which thesis statement do you recommend he use?
    8·1 answer
  • Is main memory fast or slow?
    9·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • Application servers are usually grouped into two types: page-based and _____ systems.
    6·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • Name the error that has happened in the binary addition 0¹01+111=1000​
    6·2 answers
  • Hooollaaaa , todos absolutamente todos quieren borrar esta tarea por que no tiene nada que ver con la materias del colegiooo per
    7·2 answers
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!