1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
11

Witch of the folowing functions does a browser preform

Computers and Technology
1 answer:
Elodia [21]3 years ago
5 0
<span>it gives you the ability to perform many tasks for example search something or save your favorites.</span>
You might be interested in
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
Amanda [17]

Answer:

import java.util.Scanner;

public class num1 {

   public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

   //Prompt and receive user input

       System.out.println("Enter number of Steps");

       int numSteps = in.nextInt();

       double numMiles = numSteps/2000;

       //Print the formated number of miles

       System.out.printf("The equivalent miles is %.2f ",numMiles);

   }

}

Explanation:

  • This is solved using Java programming language
  • Scanner class is imported and used to receive user input (number of steps walked)
  • To convert number of steps to number of miles, we divide by 2000, Since the question says the pedometer treats walking 2,000 steps as walking 1 mile.
  • Output the number of miles to 2 decimal places using java's printf() method
6 0
3 years ago
Read 2 more answers
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe p
Diano4ka-milaya [45]

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

7 0
4 years ago
What is the default text-wrapping option when inserting images into a Word document?
JulijaS [17]

Answer:

In line with the text

Explanation:

8 0
4 years ago
Read 2 more answers
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
What is Morse code???
aev [14]
TEETEE TEE TEE TEE TEETEETEE
4 0
3 years ago
Read 2 more answers
Other questions:
  • To track website behavior data with google analytics, which steps will you need to complete?
    14·1 answer
  • Explain three ways you can get home safely if the friend you rode with has drugs or alcohol in his or her system and you prevent
    8·1 answer
  • Assume that Precinct Report is a structured type with these fields,address (a string),and three int fields which are counts of c
    12·1 answer
  • An ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the co
    10·1 answer
  • write a python function that takes the largest and smallest numbers in a list, and swap them (without using min() or max() )
    13·1 answer
  • Prove that: P = hdg​
    7·2 answers
  • 1. You are designing a program that will keep track of the boxes in a doctor’s office. Each box will have three attributes: date
    10·1 answer
  • Digital security measures include _____. Select 2 options.
    11·2 answers
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
  • The Horse table has the following columns:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!