1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
12

Is there an answer to these picture?

Computers and Technology
1 answer:
Tomtit [17]3 years ago
6 0

Answer:

yes there is an answer to this question

You might be interested in
Need answer ASAP!!
kotykmax [81]
They can also track you by your IP address which is kind of like a thumbprint for your computer. They can also find your channel and your youtube account as well. 
3 0
3 years ago
Which of the following is not a valid variable name? 2 myInt 2. return 3. myInteger 4. total3
Reptile [31]

Answer:

Correct answer is option (2) that is "return".

Explanation:

In any programming language, a variable name can be made up of letters (lower and upper case) and digits. we can also use "_" underscore character for declaring the variables but we cannot use any special character like “$”.We cannot use digits in the beginning of variables name. And we also cannot use reserved keywords of the language like "new","return","while" etc. There should not be space between the variable names. Options 1, 3 and 4 are not violating any of these properties. But in option (2), "return" is a reserved keyword. That is why it is not a valid variable name.

Some example of valid variables name:

foo

BAZ

Bar

_foo42

foo_bar

Some example of invalid variables name:

$foo    ($ not allowed)

while   ( keywords )

2foo    (started with digit)

my foo  (spaces )

5 0
3 years ago
Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
Shalnov [3]

Answer: Child element

Explanation:

 According to the question, terry building the web site and she wants to create the three main types of links in the home page such as home, contact us and the product information. The, she start creating the hierarchy of elements in the page and also revise all the styles in the sheet.

Then, the home page contain the two child element as it s the sub elements of the home page. As, the one element which is inherited from the upper element ( Parent ) is known as child element. This is the hierarchy of the elements which represented in the home page.  

5 0
3 years ago
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor
andreev551 [17]
What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth
5 0
2 years ago
Other questions:
  • Shortcuts will help you complete spreadsheet tasks more efficiently.
    12·1 answer
  • Write a program that prompts the user to input a number. The program should then output the number and a message saying whether
    10·1 answer
  • You can access a button s screentip by _____.
    6·1 answer
  • ________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
    8·1 answer
  • When the program generates or populates reports after getting the data and processinng,it is called
    9·1 answer
  • True or False: When you share something on a friend’s Timeline, only that friend can see it.
    5·2 answers
  • A collection of realated files is called a
    12·1 answer
  • What is a project?
    5·2 answers
  • What principle of interaction is John using?
    9·2 answers
  • You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!