1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
4 years ago
8

What is indentation?

Computers and Technology
2 answers:
horrorfan [7]4 years ago
3 0

Answer:

B

Explanation:

Yuki888 [10]4 years ago
3 0

Answer:

The answer would be B.

Explanation:

Because when you indent the words move to the right.

You might be interested in
What do people in japan use to make anime
lions [1.4K]

software programming like adobe flash.

8 0
3 years ago
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, includi
EastWind [94]

I would say, "not those kinds of kernels, when I say kernel, I mean the core of your computers operating system. It controls all of the system components and tell specific parts of the computer to do certain things." or in more compact terms, "think of the kernel as the brain of the computer, telling each system component what to do."

5 0
3 years ago
Why do i keep losing points in brainly.com and how do you lose it?
kati45 [8]

Answer:

because you are asking questions like this

Explanation:

when you ask questions you lose points

6 0
3 years ago
Read 2 more answers
Each object that is created from a class is called a(n) ____________ of the class.
gladu [14]
Instance





-------------------------
7 0
3 years ago
Read 2 more answers
What are two critical properties for a cryptographic hash function?
AleksandrR [38]

Answer:

The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.

3 0
3 years ago
Other questions:
  • Which statement correctly describe the FAFSA
    5·2 answers
  • Mark for review (Will be highlighted on the review page) 11. A feature in Excel that allows you to graphically display in a sing
    10·1 answer
  • An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
    14·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • What do green squiggly lines under text indicate?
    14·1 answer
  • Write a Bash script that takes the name of a file or directory as an argument, 1. reports if it is a directory or a file, and if
    14·1 answer
  • Write, compile, and test a program named PersonalInfo that displays a person's name, birthdate, work phone number, and cell phon
    5·1 answer
  • A program execution is called ​
    15·1 answer
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!