1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
14

Who is the founder of javascript? ​

Computers and Technology
2 answers:
aleksandr82 [10.1K]3 years ago
7 0

Answer:

Brendan Eich

Explanation:

He is the founder of JavaScript

Genrish500 [490]3 years ago
6 0

Answer:

Brendan Eich is the founder of JavaScript.

Explanation:

He is an American technologist who not only created JavaScript, but was the co-founder of the Mozilla project.

You might be interested in
Choose the correct comparison statement about delivery and read receipts.
Lostsunrise [7]

Answer:

A: Delivery receipts can be enabled for all messages, while read receipts can be turned off by the recipient.

5 0
4 years ago
One disadvantage of online information sharing is that:
zubka84 [21]

Answer:

its b i just took the test

Explanation:

3 0
3 years ago
Read 2 more answers
True or False: You should only use your mirrors to see behind you when parallel parking.
mafiozo [28]
False. You should always look /check ou tall mirrors periodicly
8 0
3 years ago
Read 2 more answers
Which of the following help departments organize unique access controls for access to folders and data files within a department
never [62]

Answer:

B. Role-based access controls

Explanation:

Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.

6 0
3 years ago
Why does it still say I am ambitious whenever I have the 5 brainliest and almost 700 points?
Galina-37 [17]
Check below your score it should say something out of 5 you need to get more to get 5/5
8 0
3 years ago
Read 2 more answers
Other questions:
  • Why is art important to heritage?
    10·1 answer
  • 10. How does a command work in conjunction with a switch?
    14·1 answer
  • In cell F15, insert a function that will automatically display the word Discontinue if the value in cell D15 is less than 1500,
    6·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • We have written a method called sum with an int[] parameter nums. We want our sum method to compute the sum of nums, but our cod
    5·1 answer
  • Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
    5·1 answer
  • What computer programs can you work with to present and post your e-portfolio on the Internet?
    11·1 answer
  • A location in space is called?
    6·2 answers
  • Answer this correct and get brainly
    5·2 answers
  • What is the importance of test documentation?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!