1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
7

Lloyd has created a validation script for a data entry form. What property should he use to test for a selected radio button?

Computers and Technology
2 answers:
yanalaym [24]3 years ago
8 0
D.
the best answer is D
yawa3891 [41]3 years ago
6 0

Answer:

the answers A

Explanation:

i took the test and only did that question to make sure

You might be interested in
What are some good editing software apps for pc?
Anettt [7]

Answer:

If you have the money, buy Adobe Premiere Pro and Adobe After Effects (which is usually used in post-production).

If you need free ones many websites say Filmora, OpenShot, and Lightworks but I've used Filmora before and it's alright.

6 0
3 years ago
What device connects your computer to a wireless network?
Darina [25.2K]

Answer:

a router

Explanation:

5 0
3 years ago
Read 2 more answers
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Ruth-Anne created a document. she wants page 3 and all pages after that to be formatted with two columns. what steps should Ruth
den301095 [7]

Answer:

Following are the steps is used by the Ruth-Anne to created the document  is given below .

Explanation:

Microsoft word is used for creating the document in the well manner .There are various types of toolbars ,function,etc  are present in the Microsoft word that is used for managing and creating the document in the well formatted manned .Now following are the document that the Ruth-Anne is used is given below.

Step 1: Move to the page 3 .

Step 2: Select the option page Layout and pressing the  columns.

Step 3: Select the two column in which Ruth-Anne providing the desired format.

8 0
3 years ago
Other questions:
  • Write a program to help you feed your friends at a party by doing some math about square pizzas. Assume the grader defines a str
    12·1 answer
  • Colours in art packages are often given Hex codes as illustrated below with #00ccff. Why is Hex used in this way rather than the
    11·1 answer
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    6·1 answer
  • In a digit 13 ISBN number, can you think of errors that the check digit system cannot identify and give an example to explain wh
    5·1 answer
  • to access your course materials such as reading, textbooks, and other lesson content, it would be best to go to the?
    5·1 answer
  • What is indexing ? How does it make search engines work more efficiently?
    15·1 answer
  • What is being identified when antibodies stick to pathogens during immunostaining?
    11·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!