1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
2 years ago
6

13. Place where names, addresses and email information is stored

Computers and Technology
1 answer:
yanalaym [24]2 years ago
8 0

Answer in ur email

Explanation:

You might be interested in
_____ are like selection lists in which they limit fields to a set of possible values; but, unlike selection lists, the options
natali 33 [55]

Radio buttons exist like selection lists in which they limit fields to a set of potential values; but, unlike selection lists, the options appear as respective controls in the web form.

<h3>What is Radio button?</h3>

A radio button or option button exists as a graphical control element that permits the user to select only one of a predefined set of mutually exclusive options. The singular property of a radio button causes it distinct from checkboxes, where the user can select and unselect any numeral of items.

Radio buttons exist as a common way to permit users to make a single selection from a list of options. Since only one radio button can be selected at a period (within the same group), each available option must be its item and label. Radio buttons exist like selection lists in which they limit fields to a set of potential values; but, unlike selection lists, the options appear as respective controls in the web form.

To learn more about Radio button refer to:

brainly.com/question/20476366

#SPJ4

8 0
1 year ago
Use EBNF notation to describe the syntax of the following language constructs.
ZanzabumX [31]

Answer:

Following are the description to the given points:

Explanation:

To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.

To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.

Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link.  That's why in Option (a):

The return statement in Java is:

return ('”‘ (~[“] | ” [”e‘])*);

In option (c), it is the valid statement.

7 0
2 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Bumek [7]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

4 0
3 years ago
Once you have saved a block of text for easy insertion in other documents, it will show up where?
kherson [118]
Click file and look up the name
7 0
2 years ago
Which of the following is the output of the code
olya-2409 [2.1K]

Answer:

need to see code

3 0
3 years ago
Other questions:
  • In the database below, the arrow is pointing to a _____.<br> file<br> record<br> field<br> key field
    12·1 answer
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • What do you call a firewall that is connected to the internet, the internal network, and the dmz?
    13·1 answer
  • ____________ refers to the computer-to-computer transmission of business data in a structured format.
    15·1 answer
  • Which of the following feature are parts of Toyota’s safety system?
    10·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • What type of virus was the "lloveyou" virus?<br> 1.Trojan<br> 2.Worm
    10·2 answers
  • 1. How many column can you insert in a MS Word in maximum?
    11·1 answer
  • television broadcasts were originally delivered by using which technology? ethernet wireless coaxial cable broadband
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!