1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
12

Which design element is used to convey smoothness or roughness in a design

Computers and Technology
1 answer:
iris [78.8K]3 years ago
5 0

Keyboard would be the correct answer

You might be interested in
20.
Kazeer [188]

Answer:

Megabyte

Explanation:

Megabytes come before Gigabytes like how Gigabytes come before Terrabytes

8 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
When enter a function or formula in a cell, which is the character you must type?
vladimir1956 [14]
The answer is A. For instance, to use the sum function, you would need to =SUM()
7 0
4 years ago
What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
Makovka662 [10]
Just- you don’t wanna know alr? Alr :)
5 0
3 years ago
Read 2 more answers
Question 4
Tcecarenko [31]

Answer: squared ← number * number

Explanation:

4 0
3 years ago
Other questions:
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • When using the strcat function, you must be careful not to overwrite the bounds of an array?
    5·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·1 answer
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    8·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • Cho một File Input.TXT chứa dãy nhị phân liên tiếp của một văn bản đã mã
    13·2 answers
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • Can any software run on any processor
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!