1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
13

How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS

Computers and Technology
1 answer:
Ahat [919]3 years ago
5 0

Answer:

The answer to the given question is "3".

Explanation:

  • In the given HTML checkboxes code. We used input type= "checkbox" that provide a checkbox. That is used to select one or more options on the limited number of choices.  
  • In this code, we use check three checkbox that is "Home Address, Federal Express and UPS" in this checkboxes code we use the name attribute that works as a reference this attribute is used to submit data into the database.  

In this code, we select(check) in all three checkboxes that's why the answer to this question is "3".

You might be interested in
The key requirement in selection of the facilitator is one who is the end-user.
adell [148]
The answer is False.  Key requirement in the  selection of the facilitator is independence. The key requirement in the selection of the facilitator is that they have no direct involvement or direct interest in the project.    
8 0
3 years ago
Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
Lina20 [59]

Answer: B) Diversity of defense

Explanation:

 Diversity of defense support the multiple layer of security and it uses in different security mechanisms. The diversity of defense is the significant in the security system.

It basically reduces the configuration error and bug in the system. It also reduces the cost and complexity of the system. But it takes longer time for installing multiple different system. It is similar to defense in depth as, it also support the multiple layer of security.

 

3 0
3 years ago
The first step in transforming an extended e-r model into a relational database design is to
zimovet [89]
You need to create a table for each entity, as the first transforming step for extending e-r model toward the relational design of database.
3 0
3 years ago
Which of the following phrases describes top-down processing
soldier1979 [14.2K]

Answer:

B. The effect that our experiences and expectations have on perception

Explanation:

Top-down processing refers to how our brains make use of information that has already been brought into the brain by one or more of the sensory systems. Top-down processing is a cognitive process that initiates with our thoughts, which flow down to lower-level functions, such as the senses.

Top-down processing is when we form our perceptions starting with a larger object, concept, or idea before working our way toward more detailed information. In other words, top-down processing happens when we work from the general to the specific—the big picture to the tiny details.

5 0
3 years ago
A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts wh
Gnesinka [82]

Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

<h3>What does an open connection implies?</h3>

Connecting to an open network is one that connote that one can opens their device to others using or on that same wireless network.

Note that Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

Learn more about open connection from

brainly.com/question/5338580

#SPJ1

7 0
2 years ago
Other questions:
  • Los antivirus no son infalibles y en ocasiones pueden darnos :
    10·1 answer
  • Which of the following is a type of monitor port?
    10·1 answer
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • What does the hard disk drive do?
    9·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants
    5·2 answers
  • 100 POINTS!! Help me out please I need help with this!!
    12·1 answer
  • Describe how a black and white image could be represented in binary
    11·2 answers
  • Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
    13·1 answer
  • A company is looking to share data between two platforms in order to extend their functionality. which feature enables communica
    8·1 answer
  • What type of dns servers field dns queries, send iterative queries to upstream dns servers, or send requests to forwarders and t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!