1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
8

12. Noodle Tools is a website that

Computers and Technology
1 answer:
ASHA 777 [7]3 years ago
6 0
Your answer is going to be B
You might be interested in
Write down the importance of computers in this modern era of information technology in brief.​
Whitepunk [10]

Explanation:

The computer system is not a simple machine. It is like a very modern and highly complex calc ulator. It can do

Computers are critical for communication and are the centerpiece of information technology. The early 1990s saw the emergence of household Internet use, which eventually spurred common use of email, we bsites, blo gs, social network ing, video c hat and Voice-Over-Inte rnet Protocol.

4 0
2 years ago
The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
Trava [24]

Answer:

Pattern.

Explanation:

The pattern attribute can be used only with input boxes that store text.

Generally, the pattern attribute cannot be used with other types of data in computer programming.

Basically, it comprises of data types which mainly includes an attribute of the text, e-mail, telephone, uniform resource locator (URL), search input types and password which must all be matched with the input value in order to pass an authentication or authorization.

3 0
3 years ago
Which button would you use to quickly add addresses to a mail merge envelope?
Jet001 [13]

The answer to your question is,

C. Address Block

-Mabel <3

5 0
4 years ago
The layout of an envelope can be adjusted using the ____ tab
7nadin3 [17]
I think it’s the mailings tab
3 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Other questions:
  • In the 1950s, the three major networks (ABC, NBC, and CBS) developed prime-time shows that would appeal to a general family audi
    11·1 answer
  • Finally, Lee wants to modify the table he linked to his presentation. How should he begin?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • (Please Help)
    13·1 answer
  • There are three main components to economic growth. Which of the following is NOT a component of economic growth?
    7·1 answer
  • What is the definition of “potential energy”?
    6·1 answer
  • Steve is creating a document with proper nouns, which Word continues to identify as being misspelled.
    10·1 answer
  • In Java. Write a program that creates an integer array with 50 random values, prompts the user to enter the index of an element
    5·1 answer
  • These statements describe a network server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!