1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
5

Pressing the _____ key when entering title text in a placeholder creates a new paragraph. BACKSPACE SHIFT DELETE ENTER

Computers and Technology
1 answer:
Lunna [17]3 years ago
4 0
Enter would create a new line, thus allowing you to enter a paragraph, on some applications you can use "Shift+Enter" if it is an IM application like Skype.
You might be interested in
Carl wants to add two new characters to the extraterrestrial battleship game he's
nikitadnepr [17]

The option that  best explains the game is that a game can have multiple instances using the same class.

<h3>Can a class have multiple instances?</h3>

A game is one that can always create multiple instances of a class. This is known to be the reason that classes are made.

Conclusively,  each object often has its  own specific inner variables and they do not have only if they are static but games of multiple instances is the reason why there is only one class with the new characters.

Learn more about Games from

brainly.com/question/1786465

6 0
2 years ago
Consider the following definition of a recursive method. public static int mystery(int[] list, int first, int last) { if (first
ozzi

Answer:

c. 27

Explanation:

  • In recursion method, a method calls itself until a condition becomes true and returned back. In mystery(), at first time, first is 0 and last is 4. Condition is checked and 0!=4 so else part is executed in which again mystery is called with first as 1 and last 4. This will go again and again until first=4.
  • When first=4 it is also equal to last so if part is executed and alpha[4] is returned which is 9, now it comes alpha[3] +9 which is 8+9 =17 .
  • It is returning values to its previous calls that is why it will reduce to alpha[0]+alpha[1]+alpha[2]+17 which is nothing but sum of all elements of a alpha
  • Then, 1+4+5+8+9=27.
5 0
3 years ago
With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes rea
worty [1.4K]

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

3 0
3 years ago
Linux is not secure as it is difficult to detect bugs and fix<br> true or false plz reply
Mazyrski [523]

False.

Linux is the most secure operating system

8 0
3 years ago
What do you call when a hacker users multiple guest computers to crack a password?
azamat

Answer: Botnet

Explanation:

Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.

It also steal the data and allowed attacker to approach its connection and access its device.

Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.

6 0
3 years ago
Other questions:
  • How do you design video games
    5·1 answer
  • Writing anything that comes to mind that may relate to your personal essay is called:
    15·2 answers
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • Which email client feature allows you to store the names and information of people you contact frequently?
    5·1 answer
  • In this assignment, you will design and create an ArrayList-based application that manages a collection of DVDs. Information abo
    15·1 answer
  • Select all that apply.
    10·1 answer
  • Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
    10·1 answer
  • While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
    8·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!