1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
3 years ago
15

What is your perception of what a safe classroom looks like

Computers and Technology
1 answer:
Andreyy893 years ago
6 0

Answer:

6 feet apart

Explanation:

You might be interested in
D) Informal high level descuption of an algorithm in english kcalled
Hatshy [7]
It might be d I’m not sure die
8 0
3 years ago
Read 2 more answers
What are the controls in the Capture panel? Define each controls
MArishka [77]

Answer:

.............

........

8 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
The top element in the hierarchy is the html element , which contains all of the other elements within a Hypertext Markup Langua
Anna [14]

the answer is true

The top element in the hierarchy is the html element

6 0
4 years ago
You have been asked to write a username validation program for a small website. The website has specific rules on what constitut
vazorg [7]

Answer:

var username;           // username entered by user

var charAny;            // text character identified in username

var anyNum = false;     // digit variable used to detect whether the username has one or not

var index;              // index loop variable

var BR = "<br />";      //break

var ES = "";            //space

// Display program requirements for the username requested

document.write("We'll begin helping you select a username" + BR);

document.write("Your username must have at least 8 characters," + BR);

document.write("   start with a letter, and contain at least 1 numeric character." + BR);

username = prompt("Please enter your username: ", ES);

// Check for length of username

while (username.length < 8) {

   document.write("Your username must be at least 8 characters long." + BR);

   username = prompt("Please enter your username: ", ES);

}

// Check that first character is a letter

// Substring function has three arguments: string, starting position, and ending position

charAny = username.substr(0, 1);

while (charAny !== isLetter()) {

   document.write("The first character of your username must be a letter." + BR);

   username = prompt("Please enter your username: ", ES);

}

// Check that there's at least one digit in the username

while (anyNum !== false) {

// Check each character, set anyNum to true if a digit

   for (index = 1; index < username.substr(index, index); index++) {

       anyNum = username.substr(index, index);

       if (isNumeric(charAny)) {

           anyNum = true;

       }

   }

   // If anyNum is false there were no numerics

   if (anyNum !== true) {

       document.write("Your username must include at least 1 digit." + BR);

       username = prompt("Please enter your username: ", ES);

   }

}

5 0
4 years ago
Other questions:
  • Scale-based classification for networks allows us to differentiate PANs, LANs, MANs, and WANs. Moreover, the structure of a netw
    6·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • Define a method printFeetInchShort, with int parameters numFeet and numInches, that prints using ' and " shorthand. End with a n
    7·2 answers
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • Write a program that will draw a red circle on top of a blue square in the center of the canvas. The blue square should have sid
    12·1 answer
  • Select the correct answer.
    5·2 answers
  • Write a C Program to Print the initial letter of Name Ferdous
    14·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
  • Please answer questions in complete sentences!
    14·1 answer
  • You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!