1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
12

What does the Backspace key do?

Computers and Technology
2 answers:
borishaifa [10]3 years ago
7 0

Answer:

LOL

- It deleted the recent keys you typed. XD

Vinvika [58]3 years ago
6 0

Answer:

Delete the letter you don't need or want

You might be interested in
Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
Aleksandr-060686 [28]

Answer:

b. Code an include preprocessor directives for the members

Explanation:

Namespace in programming can be defined as the declarative region which provides scope for the identifiers such as the functions, name of the types, variables, etc.

The namespaces are $\text{used to organize}$ the code into the logical groups and also used to prevent the name collision.

The ways that can be used outside the namespace $\text{can access the members}$ as :

-- the code used the fully qualifies name

-- by using the declaration to bring one of the identifier into the scope

-- by using the directive to bring all the things in the newspaper into the scope.

Thus the correct option is (b).

5 0
3 years ago
The steps for creating a newsletter are to ____.
leonid [27]

Answer:

C) Plan, write, format, and proofread

Explanation:

You need a plan for any professional newspaper. Proofreading is also a vital step in the process. You can only format what you've already written, so it has to be C.

4 0
3 years ago
What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?
motikmotik
<span>Actually dod requires a digital type of authentication and a secure password inorder to access sensitive data on mobile devices and email, which may in the form of two step authentication code, then in the form digital phone calls, and then in the form of alphanumeric passwords and finally in the form of finger prints authentications or face recognition verification..</span>
8 0
3 years ago
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
3 years ago
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
Other questions:
  • Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and dis
    13·1 answer
  • Given that the time to read data off a 7200 rpm disk drive will be roughly 75% of a 5400 rpm disk, at what idle time of the 7200
    13·1 answer
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • What devices gives input​
    5·1 answer
  • When approaching a bicyclist from the rear, you should slow down and
    8·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • BRAINLIEST!!! 20 PNTS!!!! HELPP!!!
    12·1 answer
  • How many types of operating systems do we have as from 2010 till date​
    13·1 answer
  • Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
    8·1 answer
  • Write a program to demonstrate circular linked list with operations using pointers – insert
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!