1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondor19780726 [428]
3 years ago
8

Which programming languages are the best choices for desktop applications? Select 3 options.

Computers and Technology
2 answers:
mamaluj [8]3 years ago
6 0

Answer:

pythons to be honest

Explanation:

better structured

slega [8]3 years ago
5 0
The three are Python c and html
You might be interested in
You have a new phone. What determines what type of messages you can send?
prohojiy [21]
B the services provided by the provider
6 0
2 years ago
NO LINKS Please
Kamila [148]

Answer:

ok po majsbejwwlaodhd susbvskwmoskwaubsbsiwnwis sisbsbsb is a good 2AM 2AM 2nd edition 2and I am a nanny 2and and u 2122feet 225feet to see how 2nd grade are you 22feet but not yet a lot more because it has alot of people who is the key to the girl in your life of your own life NATO is the most powerful and I was a great person in a sentence and a very nice meeting you had to do nothing babe and she had an affair in a way maker that I am in a relationship with u are in bed now babe and my mom and my dad a lot of my cousn and my kids in the morning and my kids were in the same boat and 5PM was the first of my two 5th grade boys in school to be with u at work now babe on my messenger then the Lord was in bed and she had no probs and no babe to be in Philippines and my kids had to be a good 58 and a little more because I was so happy bday sis had a lot to say about the girl and she was busy with me I will be having dinner with the kids on me sometime next time because she is very good at home now babe ruth is it ur wife is still single forever ni mama ne is a good girl also a big part in her to be the center babe if I will be a good person and I think they 5th 5 and 5 and u have a lot more to lose than me if u have a lot

6 0
2 years ago
Read 2 more answers
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
3 years ago
Difference between multiterm access and single term access for webassign
NemiM [27]

The difference between single term access and multi term access is that multi-term access is for more than one term to courses using the same textbook edition and the Single term access<span> lasts for the duration of a Single  course in Web Assign. </span>

Multi-term access is also known as "Lifetime of Edition"

<span />
4 0
3 years ago
Who developed the idea of a universal network?
polet [3.4K]
Alan Turing fathered the machines we now lovingly call computers, however it was Nicola Tesla that birthed the idea of a world-wide wireless system.
7 0
3 years ago
Other questions:
  • The approved systems design document is used by programmers, the personnel department, and information systems personnel.
    8·1 answer
  • When excel imports an access table, the data is placed in a worksheet _____?
    7·1 answer
  • When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmis
    14·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • ___________ is a document that describes the locations of variables in the data file and lists the assignments of codes to the a
    12·1 answer
  • 2.8 Code Practice: Question 2
    11·1 answer
  • Please answer the following essay question:
    13·1 answer
  • What factors do network consultants consider when determining the network needs of a business? Use the space provided below to a
    6·1 answer
  • Is it okay for potential employers to search your social media for use in determining if you are a fit for the position?
    15·1 answer
  • Ema Company for business .
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!