1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
10

The design of a blog refers to:

Computers and Technology
1 answer:
kirill115 [55]3 years ago
8 0
The way it functions and appears
You might be interested in
The number 84 is divisible by 2,3,4 and 6. true or false
Eva8 [605]
84÷2=42. 84÷3=28. 84÷4=21. 84÷6=14. So your answer is true.
8 0
3 years ago
Read 2 more answers
Your boss is trying to modify a PDF file that he made a year ago. He asks you what he can use to do this. Which of the selection
Masteriza [31]
The answer is b. Office 2013
3 0
3 years ago
Read 2 more answers
When one method calls another, which of the following statements are true?
jonny [76]

Answer:

I. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

Explanation:

Private methods are being accessed from only within the class or scope specified. No other means of accessibility is possible, and even through inheritance. And instance methods can never call without using dot notation, any of the class method of the same class. Hence second and third options are not correct. And the class method and the instance methods of one class may call the public class methods of another class using the dot notation and referencing the name of the other class. Hence, the correct option is the first one.

3 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Sergeu [11.5K]

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

6 0
3 years ago
Other questions:
  • Computers with more than ____ of ram work with the aero interface in windows 7 as shown in the accompanying figure.
    15·1 answer
  • Define the ADT list: its properties and methods
    14·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • What do the following standards cover?
    7·1 answer
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • Modify class Time2 of fig 8.5, (which is split into four pictures) to include a tick method that increments the time stored in a
    8·1 answer
  • Who do you guys ship lol bit with?
    14·2 answers
  • The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a compute
    7·1 answer
  • How are mathematics and computer science similar? Discuss any connections between numbers, logic, and other elements.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!