1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
4 years ago
10

What type of code was Pinterest Pin button created in?

Computers and Technology
1 answer:
Ostrovityanka [42]4 years ago
3 0

They just used a website widget didn't they?

You might be interested in
What is windows powershell? I downloaded a fake video game on my PC.(It was an accident) Now, powershell is bugging me. Is it a
IrinaVladis [17]

Answer:

The PowerShell is a kind of shell framework, which was being developed by Microsoft for covering various administrative tasks like the configuration automation and management of certain repetitive jobs. And the term 'PowerShell' does refer to both of these- and its the shell applied for executing commands, and scripting language.

And yes, you have been infected by the virus. You need to run the antivirus immediately.

Explanation:

Please check the answer section.

5 0
4 years ago
Read 2 more answers
jane feels listening to music at night helps her to sleep. should jane listen to music the night before a test ​
Pavel [41]

If it help her sleep than yes! Sleep helps you to stay focused during a test.

7 0
3 years ago
Size of a request header field exceeds server limit.
garri49 [273]
Try to Increase the value for the directive LimitRequestFieldSize in the httpd.conf:


Reason: This is normally caused by having a very large Cookie, so a request header field exceeded the limit set for Web Server.
For IBM® HTTP Server, this limit is set by LimitRequestFieldSize directive (default 8K). The LimitRequestFieldSize directive allows the Web server administrator to reduce or increase the limit on the allowed size of an HTTP request header field.
SPNEGO authentication headers can be up to 12392 bytes. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.

8 0
3 years ago
Cell phone producers charge a _____, which consumers pay to buy the phones. profit production cost price
alex41 [277]
The answer is price i have gone over this specific lesson multiple times.
4 0
4 years ago
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
PilotLPTM [1.2K]

Answer: D. Artistic rights

Explanation:

The artistic rights are those rights that provide an artist with the protection of both artistic works and also allows the profit. The artist can create a piece of artistic work and distribute it for their profit.

If one without any permission creates a copy or uses original artistic work for their own purpose then he is subject to the punishment of copyright infringement due to breaching the copyright of the owner's protection.

The artistic rights will be violated if we copy a drawing from the internet and use it in a report.

8 0
3 years ago
Other questions:
  • What is the difference between a key and a superkey?
    10·1 answer
  • You are planning trip to South America and and are worried about your devices with private keys being stolen. So you decide to s
    9·1 answer
  • A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A​
    13·1 answer
  • My cell phone rear camera is dirty does anyone know how to clean it?
    14·2 answers
  • Academic databases are the best place to look for
    12·1 answer
  • Describe a common error that presenters make during their presentation and how to remedy the error​
    12·2 answers
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
  • What is memory address map​
    7·1 answer
  • Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
    6·1 answer
  • Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!