1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
6

How do i code........​

Computers and Technology
2 answers:
Dimas [21]3 years ago
5 0
Head over to CodeMonkey.
CodeMonkey teaches coding using CoffeeScript, a real programming language, to teach you to build your own games in HTML5.
wlad13 [49]3 years ago
4 0

Explanation:

What code are you talking about?

You might be interested in
Need done ASAP
Amiraneli [1.4K]

The correct answer is A. A1!

7 0
3 years ago
When the computer is turned on, the operating system is loaded from the hard disk to the _________________. *​
Pavlova-9 [17]

Answer:

The main memory (ROM)

7 0
3 years ago
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
Which of the following statement is true?
Alexxx [7]

Answer:

b. the IP address can be spoofed, so if you want to read response from the deceived party, you can use IP spoofing to hide yourself.

Explanation:

3 0
3 years ago
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
shtirl [24]

Answer:

a)

Explanation:

Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.

7 0
3 years ago
Other questions:
  • PYTHON CODE ONLY:
    7·1 answer
  • The term composite would be used to describe an image that was altered by the Crop tool.
    15·1 answer
  • Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
    7·1 answer
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    8·1 answer
  • Graphic design has as its goal the communication of some __________ message to a group of people.
    6·1 answer
  • Children's Web sites may combine educational and entertaining information and activities with interactive advertising and direct
    5·2 answers
  • Jade has to present a paper on the basic architecture of the Princeton microcomputer architecture model. Which option will he hi
    5·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!