1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
14

PLEASE HELP! Please dont answer if your going to guess

Computers and Technology
2 answers:
meriva3 years ago
6 0

Answer:

r

Explanation:

I literally learned this today when trying to make a python server with an html file:)

Oxana [17]3 years ago
5 0

Answer:

w

Explanation:

You might be interested in
What column, row, and text formatting issues are important when designing tables and lists?
MrRissso [65]

Answer:

Microsoft Excel or Google sheets.

Explanation:

7 0
4 years ago
The scope of a variable is __________________
Goryan [66]

Answer:

The scope of a variable is where it can be read or modified.

6 0
2 years ago
In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of t
kirill [66]

Answer:

It listens for sound intensity

Explanation:

It listens for the sound intensity and loudness. As the intensity varies the background color changes as well.

4 0
4 years ago
Read 2 more answers
If a packet is highlighted by black, what does it mean for the packet?
KATRIN_1 [288]

Answer:

If a packet is highlighted by black what does it mean for the packet It shows that there is a bad Spanning. Hope this helps! Pls give me BRAINLIEST!!!! =)

8 0
4 years ago
An organization is deploying a new system to the production environment. A security analyst discovers the system is not properly
Alisiya [41]

Answer:

The best answer is A) A secure baseline was not established early in the process.

Explanation:

If the organization is deploying to the production environment and the security analyst discovers this risk at this point, then a secure baseline was not established, because it is impossible to successfully pass the coding and peer review instances by programmers and testing instances by the QA team without any warning to correct this problem.

5 0
4 years ago
Other questions:
  • What are possible consequences for cyberbullying?
    11·2 answers
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined
    10·1 answer
  • A résumé can be delivered through _____.a.
    9·2 answers
  • Please help ASAP, will mark brainliest!
    14·1 answer
  • The Internet is not a good place to connect with people when looking for a job.
    10·1 answer
  • You are creating a presentation and you have come to the last slide. you still have more information to add. what should you do?
    10·2 answers
  • Describe the effects technology, particularly computers, has had on mechanical labor.
    8·1 answer
  • How do you select a single cell, a single column, a single
    10·1 answer
  • Why would a programmer use the logical operator or in an if statement? (5 points)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!