1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
3 years ago
7

Addition and subtraction are considered to be ____ operations performed by a computer.

Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
4 0

Answer:

Mathematical operations

You might be interested in
Similarities between drawing toolbar and editing toolbar​
topjm [15]

Answer:

dk

Explanation:

3 0
2 years ago
Read 2 more answers
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
kondaur [170]

Answer:

Explanation:

hope this help

6 0
2 years ago
¿que significa “TTAQMMQMPDATLSPLNDTMGCCLFEQMMPQTEIUMDR” ?
OlgaM077 [116]

Answer: what

Explanation:

5 0
2 years ago
Read 2 more answers
The _____ row is typically the first row in a table.<br><br> banded<br> total<br> header<br> odd
rusak2 [61]

the first row of the table is know as the table header.

8 0
2 years ago
Read 2 more answers
Other questions:
  • A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t
    6·1 answer
  • Which statement is NOT a rule for the data source for the mail merge?
    13·2 answers
  • Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-
    9·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • To add a new kind of information into the database you need to add a new table<br> true or false?
    7·2 answers
  • Data ____ refers to the accuracy of the data in a database
    9·1 answer
  • Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers Thi
    6·1 answer
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • How to write my name in binary code ? Rivas
    7·2 answers
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!