1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
8

What will finally break the internet? ...

Computers and Technology
1 answer:
Vaselesa [24]3 years ago
6 0

Answer:

thoma getting a rerun

Explanation:

You might be interested in
Cell styles can only be applied to the first five columns of a worksheet.<br> a.true<br> b.false
andreyandreev [35.5K]
The correct answer is A true! 
6 0
3 years ago
Read 2 more answers
What name is used to denote a common field that exists between two tables, but is also the primary key for one of the tables??"
Diano4ka-milaya [45]

Answer:

b. foreign key

Explanation:

In the database world, a foreign key is a field on one table and a primary key for another table. The purpose of a foreign key is to provide linkages between two or more tables. Given two tables A and B, and making A the point of reference, a primary key is a field that is unique in A while a foreign key is unique in B.

On another hand, a composite primary key is a combination of two or more fields/columns on database table that can be used to uniquely identify each row in the table.

In the database lingua, what we have is a unique key not a distinct key, though the two words are similar in meaning.

A duplicate key is used when an information may be repeatedly entered on a table.

So the correct option is a foreign key.

4 0
4 years ago
What is desktop computer? <br> ​
butalik [34]

Answer:

a computer suitable for use at an ordinary desk.

noun: desktop computer

"a new low-end desktop"

Explanation:

please mark me as a brainly

3 0
3 years ago
Read 3 more answers
Software that interprets commands from the keyboard and mouse is also known as the what?
7nadin3 [17]
Out of the ones that you mention, the correct answer should be 
<span> Operating system</span>
3 0
3 years ago
Read 2 more answers
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call
Elis [28]

Answer:

Trojan horse

Explanation:

Trojan, also known as Trojan horse is a type of malware that ensures that its users are misled of its true purpose. They are a common type of virus and are very dangerous in such a way that they can even hide within other programs that are harmless. Once installed, Trojan will infect every file on your computer and can even steal information or totally infiltrate your system.

8 0
3 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • What is resource Management in Wireless Communication ? Explain its Advantages?
    6·1 answer
  • Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
    12·1 answer
  • If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
    6·2 answers
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • What Word features allow you to copy multiple paragraph formatting syles
    5·1 answer
  • What is Computer categories
    9·1 answer
  • Most of the Desktop games contain a backdoor used to test and update the game.
    14·1 answer
  • Another way to create a new presentation is from the Home tab
    6·2 answers
  • A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!