1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
6

Okay so I've have 10 Brainliest, through my whole time using brainly- I want people to get brainly and points so Im giving away

my points.

Computers and Technology
2 answers:
TEA [102]3 years ago
8 0

Answer:

..........................<3<3 hi lol

Sauron [17]3 years ago
3 0
Hi. You’re very kind lol :)
You might be interested in
Examples of hacking languages​
Rufina [12.5K]

Answer:

SQL

C

JavaScript

PHP

C++

Java

Ruby

Explanation:

3 0
3 years ago
Variables used for input are associated with what controls on a form ?​
zalisa [80]

Answer:

The answer to this question is given below in the explanation section

Explanation:

There are different forms control. for example HTML form controls are:

  • Text Input Controls.
  • Checkboxes Controls.
  • Radio Box Controls.
  • Select Box Controls.
  • File Select boxes.
  • Hidden Controls.
  • Clickable Buttons.
  • Submit and Reset Button.

to take input from the user and store it into the variable, mostly text input form control is used.

however, you can also use text input, checkbox, radio button as a control to take input from the user and store the input value in some variables.

5 0
3 years ago
A ____ web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to b
Vladimir [108]
Your answer is spoofed.
Thx and take care
7 0
3 years ago
To which built-in object does the function sin(x) belong?
Harlamova29_29 [7]
Choice B

Explanation: Sin() is a math function.
5 0
4 years ago
What is the default letter assigned for the primary hard drive?
SVETLANKA909090 [29]

d drive i think unless ssd

8 0
3 years ago
Other questions:
  • For the MIPS assembly instructions below, what is the corresponding C statement? Assume that the variables f, g, h, i, and j are
    15·2 answers
  • Assume the number variable contains the number 1000.
    5·1 answer
  • All wireless networks have their own name, referred to as the ________, which is used to identify the network.
    11·1 answer
  • Your task is to improve a multi-threaded program that frequently writes small entries to a shared file by introducing a layer th
    7·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Mana
    6·1 answer
  • A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most
    9·2 answers
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
  • 2.5 code practice
    12·1 answer
  • For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!