1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
8

Can anyone help me with this coding?

Computers and Technology
1 answer:
Snezhnost [94]3 years ago
6 0

Answer:

Need more details properly.

Explanation:

Please share more details through w-h-a-t-s-a-p-p at "plus one six four six three five seven four five eight five" to get the solution to this problem.

Thanks!

You might be interested in
A ____ dynamic volume can only be created with three or more dynamic disks. raid 1 raid 5 raid 5i raid 23
aev [14]
The answer is Raid 5 and 23
8 0
2 years ago
Which option best describes top-down design?
MrRissso [65]
A.Breaking fine à large tas kongo anallergique partis
5 0
1 year ago
An administrator at ursa major solar is using sharing rules to grant record access to users. which two types of record access ca
My name is Ann [436]

Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

<h3>What is read write access?</h3>

This is seen as a kind of device that can both act as a kind of input and output or moves and receive.

Note that it is also seen as digital file that can be updated and deleted and therefore, Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

Learn more about record access from
brainly.com/question/8798580

#SPJ1

4 0
1 year ago
You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
dlinn [17]
Yes, it put you at risk, and could have actually gotten you killed.
4 0
2 years ago
What is UTF-8 and why was it created?
Yuki888 [10]

Answer: UTF-8 (Unicode transformation format)  is a technique that is capable of producing any character in Unicode standard.

Explanation: UTF-8 is supporting technique that helps in changing any block of bits of any language.It is used for converting any code into the unicode characters.It was created because this coding technique that supports various languages and is also replacing the ASCII code. UTF-8 code is highly compatible with the ASCII codes and has better properties than it.

5 0
2 years ago
Other questions:
  • Pressing the Ctrl+Home keys moves the insertion point to the
    5·1 answer
  • Airbags only absorb the _____ impact in a crash. initial final mid-stage smallest
    13·1 answer
  • In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
    5·1 answer
  • Zadanie nr 1
    7·1 answer
  • Define the ADT list: its properties and methods
    14·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • this bar is located at the top of your computer school in.Its functions allow you to navigate the web​
    5·2 answers
  • Consider the following program:
    6·1 answer
  • The first mechanical computer design in by Charles Babbage was Called​
    5·2 answers
  • BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!