1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
14

Scripting languages are distinguished by their ____ types.

Computers and Technology
1 answer:
vodomira [7]3 years ago
3 0
I believe the answer is font.
You might be interested in
Which one of these is NOT a successful budgeting strategy?
Elina [12.6K]
Answer D isn't a successful budgeting strategy.
7 0
3 years ago
Read 2 more answers
As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
aleksklad [387]

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
5 0
3 years ago
Secondary storage devices that are input and output devices include all except:
inessss [21]
Output devices. You're welcome
6 0
4 years ago
Which punctuation mark should go in the underlined space to show a break in the speech?
Arisa [49]

Answer:

...

Explanation:

The elipses show a pause while showing that the information is relevant

3 0
3 years ago
Read 2 more answers
Why is a specific naming convention important in regards to your file management system?
Kobotan [32]
Because it keeps your files, folders, and documents in a consistant logical way.
4 0
3 years ago
Other questions:
  • Which protocol, as a companion protocol to RTP, provides monitoring and reporting for RTP connections?
    14·1 answer
  • What to buy instead of the hp chromebook 13
    15·1 answer
  • Footnotes and endnotes can be used to explain information in more detail, add opinions or comments, or to cite sources in the do
    7·1 answer
  • Microsoft edge is a web browser that was designed as an add-in to internet explorer. true or false
    5·1 answer
  • One reason to buy a home instead of rent a home is:
    5·1 answer
  • Why do you think that so many of these sources have similar names?
    9·1 answer
  • What might be some examples of Digital Citizenship Behavior?
    11·1 answer
  • 1. Write a generic method that compares its 2 arguments using the equals method and returns true if they are equal and false oth
    8·1 answer
  • Resumen sobre Tailandia​
    10·1 answer
  • Your customer said that understanding the directions is difficult. This is an aspect of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!