1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
14

Cheri needs to write a small program that interacts with the user. What step will allow her to do this?

Computers and Technology
2 answers:
Alinara [238K]3 years ago
8 0

Answer:

Including a input statement

Explanation:

You need a input statement in order for it to work, here´s an example;

script.parent.click <u>then</u>

you need the ¨.mouse¨ after parent or it wouldnt work.

Tju [1.3M]3 years ago
3 0

Answer:

Including an input statement

Incorporating engaging content

Explanation:

Interaction suggests that the user will provide input, for which you will need an input statement.

However, part of the interaction would also be to incorporate engaging content, so I would not dismiss that answer.

You might be interested in
QUESTION 9 of 10: Bob charged $200 for a plane ticket last month. When he received his statement, he saw that he could pay the m
IgorLugansk [536]

Answer:

yes cuz 25x8=200

Explanation:

3 0
3 years ago
Read 2 more answers
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
The IT infrastructure components should be evaluated based on their expected financial value. All of the following are used to q
vladimir2022 [97]

Answer:(A) usability

Explanation:

The term usability refers to the usage value of products, how much they can be used and their value after their use. So adding on these points usability helps to quantify the financial value of IT components.

5 0
3 years ago
Give me 5 examples of Cyber Security
Vera_Pavlovna [14]

Answer:

Firewalls, Antiviruses, Malware, Antispyware,

Explanation:

8 0
2 years ago
1. What is the difference between a group and a topic?
kap26 [50]
<h3>What is the difference between group and a topic ?</h3>

<h3>Group</h3>
  • You can publish a comment or question to the main community feed or to a group of which you are a member. Members with a common interest can form group within the wider community to form a small community around that topic and group posts will only appear in the feeds of other group members, not in the general community feed.
<h3>Topic</h3>
  • Topic work similarly to hashtags. Use the "+" symbol to the left of the Post/Ask button to add a topic (tag) to your post or question so that it can be classified along with other related posts and topics are a way to group posts and queries with similar content, but they don’t bring everyone with the same interest together in one place and this is where the groups come in!
7 0
2 years ago
Other questions:
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of d
    11·1 answer
  • With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external
    8·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • Read the following scenario what type of business letter do you think is required in this situation?
    12·2 answers
  • Consumer consequences for illegally downloading software
    6·1 answer
  • Retype the paragraph with the corrections. There are 12 corrections. Look closely at the word and letter highlighted in yellow t
    9·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!