1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
15

10 points!!!! Giving brainly to correct answers ! how do you make your questions wroth 5 points? mine only goes down to 10 >:

|
Computers and Technology
1 answer:
liberstina [14]3 years ago
3 0

Answer:

If you put 10 itll put 5 if you put 20 itll put 10 hope i helped love yall

Explanation:

You might be interested in
What is the best way to appeal to an audience in any medium ?
BigorU [14]

Answer:

I think it's D

Explanation:

The best way to appeal is with emotions

8 0
4 years ago
Explain how principles of computer programming are applied in different languages to produce
sweet-ann [11.9K]

Answer:

Principles of computer programming are applied in different languages to produce  software applications is described below in detail.

Explanation:

The main types of programming languages are:

  • Functional Programming Language.
  • Scripting Programming Language.
  • Logic Programming Language.
  • Procedural Programming Language.
  • Object-oriented Programming Language.

The programing language authorizes us to write dynamically programs and advance online explications such as- Games, web applications, and mobile applications, etc. Programming is employed to assemble, maintain, automate, measure, and interpret the processing of the data and knowledge.

7 0
3 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Which of the following is NOT one of the Big 3 Google Applications that we discussed?
fredd [130]
I’m thinking C - Word because that isn’t a part of the google family, it’s microsoft.
7 0
4 years ago
Read 2 more answers
Which standard is commonly used on the Internet to represent non-numeric data?
mezya [45]
ASCI is the standard that is commonly used on the Internet to represent non-numeric data. ASCI stands for American Standard Code fro Information Interchange. This character encoding standard represents text in computers, telecommunications equipment, and other devices.  It assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code
4 0
3 years ago
Other questions:
  • How does a combustion engine works?
    7·2 answers
  • The _____ text wrapping option wraps text around the object, with the text forming to the shape of the object.
    14·1 answer
  • Which of the following terms best describes the product development process?
    8·1 answer
  • Uh i g08ujunuyv kjmn
    11·2 answers
  • Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to oper
    5·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • What is the name given to software that decodes information from a digital file so that a media player can display the file? har
    11·1 answer
  • Public class Dog
    7·1 answer
  • How Much did a case of soda (any kind your choice ) cost in 2004?<br> PLS HELP!!!!!!
    13·1 answer
  • Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!