1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
3 years ago
9

How many radio buttons from the following code can be selected at any given time?a.Home Addressb.Federal Expressc.UPS

Computers and Technology
1 answer:
ipn [44]3 years ago
6 0

3 radio buttons from the following code can be selected at any given time.

<u>Explanation:</u>

In any programming language end user prompts either checkbox or radio buttons.

Normally checkbox are used for end user to select true or false methods where return value will true if checkbox click or false, one or zero. It all depends how end user uses the checkbox in his or her programming languages.

Radio buttons are used to end user in the programming languages where to select one radio buttons out of given radio buttons.

Where each radio buttons are marked with own assigned values. Based upon user selecting the radio buttons return will be assigned value of selected radio button.

If select option is multiple, each category of radio button is placed in grouping.

You might be interested in
A keyboard would be considered _____. Select 2 options.
Digiron [165]

Answer:

What are the 2 options?

Explanation:

7 0
3 years ago
Read 2 more answers
Using the flowchart diagram, identifythe decision point of this solution?
ELEN [110]

Answer:

Is there an early pay discount?  

Explanation:

This determines and instructs what path the code should take,

if there is no early pay discount, it has different instructions to follow.

3 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
An audit trail is a record of how a transaction was handled from input through processing and output
Nostrana [21]

The answer is : True.  An audit trail is a record of how a transaction was handled from input through processing and output.  An audit trail is the evidence, such as purchase orders and invoices, that a financial transaction actually occurred.

6 0
3 years ago
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
s2008m [1.1K]

Answer:

IP address

Explanation:

In computer networks, every computer has assigned with a unique address that is called logical address or IP address.

This address is assigned by ICANN and used to access that particular computer by other computers on the network.

3 0
4 years ago
Other questions:
  • Please helpp!! I need it quickly!
    6·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • Using python:
    10·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid sub
    5·1 answer
  • The physical elements needed for the production of digital media, such as computers, servers, and so on are called the {Blank}
    8·1 answer
  • When can you access the BIOS setup utility?
    14·1 answer
  • The full meaning of UNIVAC and ENIAC​
    5·2 answers
  • A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!