Now the y0utube home screen is gone

Now The Y0utube Home Screen Is Gone

Answers

Answer 1

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

Answer 2
Shut down then power back up and then see if it work or rest.

Related Questions

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

If you want the words “My puppy is a poodle” to appear in the output box, what Python code should you use?

A.
create “My puppy is a poodle”

B.
execute (“My puppy is a poodle”)

C.
print(“My puppy is a poodle”)

D.
print “My puppy is a poodle”

Answers

Answer:

i think it is B hope it helps

The answer is B execute (“ My Puppy is a poodle”)

It wouldn't let me say it so I'm screenshotting it.

It wouldn't let me say it so I'm screenshotting it.

Answers

yes it happend to me if you go on my questions

It is a Trojan horse. Most people don’t understand that but basically what it wants you to think is that it will gather information off you. But in fact unless your a very public figure the site will use your computer for the virus. Most people do this so if the authorities try to find them, it will lead them to you. This is just a local scam so nothing like this will happen, but this is still no reason to click on it.

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

What is the purpose of indexing?
A. To combine characters in order to form a single string
B. To combine two or more strings into one big string
C. To pull out a group of characters from a string
D. To pull out one specific character from a string

Answers

Answer:

D. To pull out one specific character from a string

Explanation:

Indexing allows you to access individual characters in a string directly by using a numeric value.

I agree it is D congrats

explain the history of computing of mechanical era

Answers

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

heyy i hope ur doing greatt! i srs need help:'')

heyy i hope ur doing greatt! i srs need help:'')

Answers

capital territory

dependent territory

disputed territory

Explanation:

i hope it can match

1.) Capital Territory
2.) Dependent Territory
3.) Disputed Territory

How does binary code control the processes in a computer.

Answers

They control the computer this is because they both on the pc& the pc helps the computer & this is more likely to be the brain of the computer wich controls it

Binary systems employ the code to comprehend user input and operational instructions and to offer the user with an appropriate output.

What is binary system?

Binary system is defined as a numbering system where each digit can only have one of two values—0 or 1—and which serves as the foundation for all binary code used in computing systems. These systems make use of this code to decipher user input and operational directives and provide the user with the desired result.  

The binary is read from, say, disk and loaded into memory. The memory contents are then loaded into a processor local resister according to a directive issued by the processor logic to the memory controller. The CPU then interprets it as a command to execute.

Thus, binary systems employ the code to comprehend user input and operational instructions and to offer the user with an appropriate output.

To learn more about binary system, refer to the link below:

https://brainly.com/question/2824068

#SPJ2

1. Why is it important to know how to create a slide?

2. How can you utilize the knowledge in making a slide as a student?​

in own sentence pls

Answers

1. Knowing how to create a slide is important because it is a useful tool for organizing and presenting information in a visual and engaging way, which can help to enhance communication and understanding.

2. As a student, knowing how to create a slide can be beneficial for presenting research findings, summarizing key information, and organizing study materials in a clear and visually appealing way to aid in the learning process.

Answer:

1. Because slides help in improving visual aids. It improves understanding when teaching student.

2. You can make projects, shows, teach others, and play with it just for fun

Explanation:

3 different ways that ultrasonic sensors can be used in everyday life.

Answers

Answer:

Ultrasonic Sensors Uses:

Anti-Collision DetectionPeople DetectionContouring or ProfilingPresence DetectionBox Sorting using a Multi-Transducer SystemEasy Control of Trash Collection VehiclesPallet Detection with ForkliftsBottle Counting on Drink Filling Machines

Learn more about Ultrasonic Sensors here

Visit —

https://brainly.in/question/19907919

https://brainly.ph/question/13809853

Hope my answer helps you ✌️

Mark BRAINLIEST

Ultrasonic diffuse proximity sensors.
Ultrasonic retro-reflective sensors.
Ultrasonic through-beam sensors.

CodeHS 2.1.4 Evidence collection.


Charles Babbage


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:



Ada Lovelace


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:



Alan Turing:


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:




Mauchly and Eckert


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:




ENIAC Programmers


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:




Grace Hopper


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:



Mark Dean


1. Time Period:


2. What did the term 'computer' mean?


3. Main contribution:




Bonus Exhibit


1. Who is missing from this picture?


2. What questions do you have about this image?


3. Why do you think some are included while others are not?


Final Report: Who invented the computer?

Claim:

Evidence:

I need help asap pls helpppp

Answers

Answer:

The term computer is derived from the Latin term 'computare', this means to calculate or programmable machine. Computer can not do anything without a Program. It represents the decimal numbers through a string of binary digits. The Word 'Computer' usually refers to the Center Processor Unit plus Internal memory.

Explanation:

computer means a devise

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

The first person gets the brainiest!!!
Match the areas seen on the presentation program’s interface with their uses.

A. Placeholder

B. Speaker Note

C. Slide Master

D. Theme


1. default template for any new presentation

2. predefined appearance of a slide

3.used to insert the choice of items on a slide

4. guidelines that assist in delivering the presentation

Where is my Plato/ Edmentum at???

Answers

Answer:

1A

2D

3C

4B

Explanation:

:)

1 is A
2 is D
3 is C
and
4 is B

does anyone have rrrooobbllloooxx

Answers

I used to but not anymore sadly

Answer:

nope

Explanation:

can someone describe how sampling is used to capture audio on a computer?
please make it easy I am struggling. Im in 7th.

Answers

Answer: Sampling is a method of converting an analogue audio signal into a digital signal.

Explanation:

While sampling a sound wave, the computer takes measurements of this sound wave at a regular interval called sampling interval. Each measurement is then saved as a number in binary format.

What the person said above me

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I need help NOWW pls. My question is "Because of increasing advances in technology, there are careers available that weren’t even invented ten years ago. One such career is a social media manager. Research online what a person in this career does and explain how the need for this career developed. Then think of a technology that might be invented in the future and name a career that might develop from it." WORTH 23 PTS!!! HURRY ASAP......!!!! I'll just put Computers And Technology but it's middle school grade 6 career!!!

Answers

Answer:

A social media mangers are in charge of the company social media. They usually respond to comments, advertise the stuff they have and create content. This career has taken off since it first began and has become more popular for both practitioners and researchers.

Explanation:

Answer:

What about a self driving airplane. This way, all you would have to do is make sure it works

Explanation:

Part 1: Plan and Write the Pseudocode
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
Decide on the message you would like to display to the screen. Some ideas include:
Your favorite book title or TV show and why you like it
A few sentences sharing information about you
Your favorite sport and team or athlete
Use two variables to store your message.

What would you recommend doing for this part?

Answers

Answer:

I would recommend doing a favorite TV show and why you like it, it's what I did. Seeing how it is your favorite TV show, you should be able to explain why you like it in a short sentence really easy lol.

For pseudocode, I did something simple, here's basically what I did:

Set "variable name" as "My favorite show is "favorite show"."

Print "variable name"

Set "different variable name" as "I like this show because "reason you like the show"."

Print "different variable name"

And that was my pseudocode

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

20 points and brainliest please help
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
2. Use two variables to store your message.

Answers

Answer:

Main Module()

Declare String P1 = "The Fourth Closet"

Declare String P2 = "because it's about FNAF"

Do

Display P1

Display P2

End Module

Explanation:

You can put whatever in P1 and P2

Answer:

Explanation:

Insert your pseudocode here:

Begin Program

My name is Sophia, favorite book is “I found you” because the author had well described the book.

I was born on February 18th, 2008

Name my first variable (About me)

Name my second variable (Birth date)

Print my first variable (About me)

Print my second variable (Birth date)

End Program

(This is what I did}

Which word pairs are both principles of HCT?
O Web Design and Feedback
O TCP/IP and Visibility
O Network Engineering and Game Programming
O Reusability and Tolerance​

Answers

Answer:

network engineering and game programming

Reusability and Tolerance​ are both principles of HCT, hence option D is correct.

What is HCT?  

 

HCT stands for home and community-based therapy. This is actually a home-based behavioral health service for children and all families who are looking for a better treatment plan, one that is more sophisticated in comparison to emergency therapy.

This deals as far as the HCTs are concerned, they have received thorough training in a variety of therapy methods, including those that are related to cognitive science, and trauma-focused cognitive therapy.

However, some artistic talent and imagination are also needed, therefore you should be familiar with graphic design.

Therefore, the principles of HCT are reusability and tolerance., so option D is correct.

Learn more about HCT, here:

https://brainly.com/question/14871114

#SPJ2

HELP ME?!!?!?!?!?!?
This is for BIM class and its due before 11:59 central time <333
24. Which of the following areas in the PivotTable Field List task pane should you place numerical values to be summarized?
A. FILTERS
B. VALUES
C. ROWS
D. COLUMNS

25. Brian wants to apply a different chart style to his PivotChart. Which of the following PivotChart Tools tabs should be used?
A. Analyze
B. Format
C. Styles
D. Design

Answers

24 is rows, 25 is styles
trust me the answer is B

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

Be sure to answer the following in complete and detailed sentences.

1. What might be a benefit of wirelessly connecting smart devices in a physical computing project?
2. How might you connect more than two micro:bits to activate multiple outputs triggered by one micro:bit?
3. How do batteries and other types of power sources make physical computing systems more mobile? Why is that helpful?

Answers

Answer: 1, 3

Explanation:

1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Answer:1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Explanation:

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

My feelings alwayss T-T

My feelings alwayss T-T
My feelings alwayss T-T
My feelings alwayss T-T

Answers

it’s ight brodie:)))

Answer:

my feelings always :/

Explanation:

Identify the error in the following block of code.
for x in range(2, 6):
print(x)
A. The first line is missing quotes.
B. The first line has a spelling error.
C. The second line has a spelling error.
D. The second line needs to be indented four spaces

Answers

Answer:

D.The second line needs to be indented four spaces

Explanation:

Since the print statement is not indented, it is not part of the for loop. This means that there are no lines of code to be executed in the for loop, so this will cause an error.

D I had this question

Which of the following scenarios falls into the category of network crimes?
A) listening in on someone’s private online conversation
B) stealing classified information from someone’s computer account
C) knowingly sending an email with malware
D) sending a hurtful message to a friend

Answers

Answer:

B

Explanation:

Hope it helps!

The options A, B, and C fall into the category of network crimes.

A) listening in on someone’s private online conversation

B) stealing classified information from someone’s computer account

C) knowingly sending an email with malware

The category of network crimes?

A) When you secretly listen to someone's private online conversation, it is called eavesdropping or unauthorized interception of communication. This is considered a type of cybercrime. It is against the law in many places to listen to private conversations without permission.

B) Taking secret information from someone's computer account: This is a very serious crime called "hacking" or "sneaking into computer systems without permission. " Going into someone's computer account without permission to take important or secret information is against the law.

Read more about network crimes here:

https://brainly.com/question/31589991

#SPJ3

Other Questions
Nine points are arranged in a 3 x 3 grid, as shown below. In how many different ways can you choose three points, so that they form a right isosceles triangle? FILL THE BLANK. after bingeing on cakes and cookies, bonnie practices self-induced vomiting to avoid gaining weight. based on this information, you would expect to notice ________ as a sign of her purging behavior. it's A I got it on edge need help with biology which territories did the United states gain contol of as a result of the Spanish american war Although some Native Hawaiians want the right to govern themselves, others want to secede from Hawaii and become an independent nation. If this is what the majority of Native Hawaiians want, should they be allowed to do so? Why or why not? wyle co. has $1.4 million of debt, $1.5 million of preferred stock, and $1.8 million of common equity. what would be its weight on common equity? 0.26 0.38 0.32 0.35 What has been the significance of a written alphabet to past societies?How do historical maps helps archaeologists discover information about ancient societies?How do ancient texts help archaeologists learn more about a society?What kind of materials were ancient texts made out of?- What important texts have been found from ancient times? What is the solution to the inequality below? 840 Which statement best describes the area of Triangle ABC shown below? A triangle ABC is shown on a grid. The vertex A is on ordered pair 4 and 6, vertex B is on ordered pair 6 and 1, and the vertex C is on ordered pair 2 and 1. (1 point) a It is twice the area of a rectangle of length 4 units and width 5 units. b It is one-half the area of a rectangle of length 4 units and width 5 units. c It is twice the area of a square of side length 5 units. d It is one-half the area of a square of side length 5 units. When the price of oil declines significantly, the price of gasoline also declines. The latter occurs because of a(n):___________A. increase in the demand for gasoline.B. decrease in the demand for gasoline.C. increase in the supply of gasoline.D. decrease in the supply of gasoline. A city has a population of 340, 000 people. Suppose that each year the population grows by 3.75%. What will the population be after 10 years ? Use the calculator provided and round your answer to the nearest whole number. How are whales and hummingbirds related? an asset that costs $31,000 and has accumulated depreciation of $11,200 is sold for $17,200. what amount of gain or loss will be recognized when the asset is sold? The company's wacc is 10. 5%. what is the irr of the better project? (hint: the better project may or may not be the one with the higher irr. ) round your answer to two decimal places please help! all answers are appreciated Number 10 plsss help mee Zoe was comparing the variability of three of her stocks. Over the last month ACE stock had a mean price of $37.03 per share with a standard deviation of $1.5, while FHJ stock had a mean price of $60.55 per share with a standard deviation of $2.62, and LMP stock had a mean price of $124.9 per share with a standard deviation of $3.06. Out of these three stocks, what was the greatest coefficient of variation?Round your answer to a hundredth of a percent. Input just the number. Do not input the percent sign. Do not use a comma. Example 4.35 According to research evidence, __________ is the most persuasive form of evidence presented in court. Algebraically determine the solution(s) to the following equation. Answer as an exact answer, and then answer to the nearest hundredth. 3^2x=4^x+6 (3 marks total) Your answer: