1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
6

1. W jaki sposób można wyrównać tekst po wstawieniu tabulatora?

Computers and Technology
1 answer:
Advocard [28]3 years ago
5 0
I would say the correct answer is #1.
You might be interested in
A designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development
Eddi Din [679]

In the case above, file name do not reflect best practices and as such it is No. A file name must include the date, the author, and the version number.

<h3>Why should a filename reflect its contents?</h3>

A file name is known to be the key identifier of a file and a Good file name need to present some clues in regards to its content, status and version.

Hence, In the case above, file name do not reflect best practices and as such it is No. A file name must include the date, the author, and the version number.

See options below

Does this file name reflect best practices?1 point

Yes. A file name should include the project name and version.

No. A file name must include the date, the author, and the version number.

Learn more about file name from

brainly.com/question/1982059

#SPJ1

6 0
2 years ago
When a user stores data in "the cloud", the data is stored on the user's premise in what is called a "cloud server"?
bija089 [108]
I'm pretty sure that's false  :0
8 0
3 years ago
4.2.10: Multiplication Table: Create a program using a for loop which will print out the 4’s times table through 10.
nordsb [41]

I included my code in the picture below. Best of luck.

6 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
What are the objects in object-oriented programming language?
VMariaS [17]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

5 0
3 years ago
Other questions:
  • When you right-click a spreadsheet object, what command should you select to activate the sheet?
    6·2 answers
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    8·1 answer
  • The _____ lets you see what styles have been applied to specific parts of a document, such as headings.
    9·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • Write a shell (text-based) program, called first_word.py, that opens the file stuff.txt and prints out the first word of every l
    14·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • Of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
    12·1 answer
  • Memory of your familiar old e-mail password may block the recall of your new password. This illustrates
    8·1 answer
  • How does a python programmer concatenate a numeric value to a string value?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!