The answer would be A.) Web pages provide information, while web applications allow the user to do something. a web page is for relaying information. (you can relate this to a book. a page in a book gives you information.) while an application allows you to perform an action.
Answer:
Hey mate.....
Explanation:
This is ur answer.....
<em>Input refers to any information, or data, that is sent to a computer for processing. Input is often sent to the computer from a device such as a keyboard, mouse, or other input device. Putting it simple, input is the act of entering data into a computer.</em>
<em />
Hope it helps!
Mark me brainliest....
FOLLOW ME!!!! :)
Answer:
#include<iostream>
using namespace std;
int main()
{
int a,b,c;
cout<<"enter the value of a:";
cin>>a;
cout<<"enter the value of b:";
cin>>b;
cout<<"enter the value of c:";
cin>>c;
cout<<"product is:"<<(a*b*c);
return 0;
}
Explanation:
Answer:
// here is code in c++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main() {
// variables to read birth month and year
int birthMonth,birthYear;
cout<<"Enter the birth month:";
// read the birth month
cin>>birthMonth;
cout<<"Enter the birth Year:";
// read the birth year
cin>>birthYear;
// print the output
cout<<birthMonth<<"-"<<birthYear<<endl;
return 0;
}
Explanation:
Declare two variables "birthMonth" and "birthYear". Read the value of birthMonth and birthYear from user. Then print the birth month and birth year and a dash(-) in between them.
Output:
Enter the birth month:1
Enter the birth Year:2000
1-2000
Enter the birth month:5
Enter the birth Year:1950
5-1950
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.