1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
9

the tool that is used on the form to display text that the user cannot change is a. textbox b. label c. button​

Computers and Technology
1 answer:
dolphi86 [110]3 years ago
3 0

Answer:

The answer is b. label

:)

You might be interested in
What is a mask used for? What is a format used for? Which can affect the way that data is stored?
scoray [572]

Answer:

 Mask is the process of replacing and changing the sensitive information and data element from the stored data so, the given structure in the data remain the same while the data itself change for protecting the sensitive information or data in the system.

This process is commonly known as data masking. The main purpose of mask is that it protecting the information or data.  

Format is the process of specify the bits for using in the digital storage and it is mainly used for encoding the information and data. It basically designed for formatting the document so that it can store in the media with the proper format in the computer system.

3 0
4 years ago
It do be like that tho ​
kakasveta [241]
What
....... .......
?
8 0
3 years ago
3 ways to get home safe if there's drugs in your system
almond37 [142]
Dont drive so ask a friend to drive you home
3 0
3 years ago
wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations
andrezito [222]

Answer:

The correct answer to use in filling in the gap is "Command languages interaction".

Explanation:

Command languages interaction occurs when the user enters command which are not always remembered, the computer executes it (with feedback if necessary), then requests next command.

This implies that under command languages interaction, "Command prompts" are employed by users who enter in commands and maybe certain parameters that impact how the command is executed.

Therefore, the correct answer to use in filling in the gap is "Command languages interaction".

6 0
3 years ago
Explain how arrays are stored in memory? Show how arr [5] is stored in the memory. Assume each memory location is one byte long
Black_prince [1.1K]

Explanation:

Array is collection of similar data types it is a linear data structure.Array stores elements in a contiguous memory location.

We have an array arr[5]  of size 5 and it is of integer type.Suppose the starting address of the array is 2000 and each memory location is one byte long.As we know that the size of integer is 2 or 4 bytes we take it 2 bytes.

If the starting address is 2000 that is of index 0 then the address of index 1 is 2000+2=2002.

address of index 2=2004.

address of index 3=2006.

address of index 4=2008.

Since size of int is 2 bytes hence we add two memory location.

8 0
3 years ago
Other questions:
  • QUESTION : John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows hi
    15·1 answer
  • An online museum is creating a site hosting hundreds of thousands of digital representations of art from around the world. The w
    5·1 answer
  • Branching is so called because <br>​
    5·2 answers
  • WILL GIVE BRAINLIEST!!!!!!!!
    9·1 answer
  • What does a proxy server do?
    5·2 answers
  • PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
    9·1 answer
  • Which statement regarding killers is true?
    12·2 answers
  • T.L.E
    6·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!