1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
7

I was able to solve the question :))

Computers and Technology
1 answer:
Leviafan [203]3 years ago
4 0

Answer:

ill take the points anyway

Explanation:

You might be interested in
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
In which generation microprocessor was developed short answer of computer science​
3241004551 [841]

Explanation:

in fourth generation microprocessor was developed.

may it helped u

5 0
3 years ago
The replacer parameter of the stringify method accepts a/an ______________ or an array.
Elina [12.6K]

Answer:

The answer is function

Explanation:

As a function, it accepts two parameters: the value and the key being stringified.  It can be used to change the value of the entries or eliminate them. As an array, it specifies by name which entries and names of the properties in the object to include in the resulting JSON string.

7 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
You write a short story, but you want to make sure your work is protected before you post it online. What should you do to help
Mars2501 [29]
Make sure you but no copyright, author, and date of publication, that may help.
8 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • Write an if-else statement to describe an object. Print "Balloon" if isBalloon is true and isRed is false. Print "Red balloon" i
    9·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • Application software definition word excel powerpoint microsoft
    13·1 answer
  • Anybody know this question??
    8·1 answer
  • which feature of organisations to manage needs to know about to build and use information system successfully
    6·1 answer
  • Define the terms of data and information .​
    6·1 answer
  • Who plays Pokemon Go if you do put your code in your answer so I can friend you.<br><br><br> o_o
    5·2 answers
  • Which statement is true about the energy of electromagnetic radiation?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!