1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
2 years ago
13

1.

Computers and Technology
1 answer:
ludmilkaskok [199]2 years ago
8 0

Answer:

D. Are concerned with environmental issues is the answer

You might be interested in
Python: Bad input on line 8. What is the fix, please can someone tell me I’m desperate?
JulijaS [17]

Answer: use GitHub or stack over flow or

repl. it

Explanation:

8 0
3 years ago
design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike co
Law Incorporation [45]

Answer:something you gotta do on your own

Explanation:

7 0
3 years ago
How do you use bold text?
taurus [48]

Answer:

Android: Tap and hold the text you're entering in the text field, then choose Bold, Italic, or More . Tap More to choose Strikethrough or Monospace. iPhone: Tap the text you're entering in the text field > Select or Select All > B_I_U. Then, choose Bold, Italic, Strikethrough, or Monospace.

Explanation:

8 0
3 years ago
Read 2 more answers
What is best for a busy student to do for better results in school?
vlada-n [284]

Answer:

Manage time and stress

Explanation:

This is obvious

4 0
3 years ago
Read 2 more answers
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the given original work is protected by the copyright law
    9·1 answer
  • What error occurs when you perform an illegal math operation such as divide by zero
    13·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • When users talk about font size,
    10·2 answers
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • CLICK ME IF U DARE hehehe
    10·2 answers
  • Who is big brain me or you
    14·1 answer
  • How can i setup a mesage room and also want to hangout ??????
    10·1 answer
  • can i get an access code for free online? if yes, what website is it so i can get a free access code?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!