1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
10

(50 POINTS)Look at the code in the example below, and then answer the question.

Computers and Technology
2 answers:
Artist 52 [7]3 years ago
5 0
Yeah what that guy said tool tip
marusya05 [52]3 years ago
4 0

Answer:

I think it is:

<h2><u>B. An Element</u></h2>

Explanation:

You might be interested in
Cuando hablamos de entornos digitales de enseñanza aprendizaje a que nos estamos refiriendo
olga2289 [7]

Answer:

Al hablar de entornos digitales de enseñanza y aprendizaje, la frase apunta al avenimiento de medios informáticos y tecnológicos al proceso metodológico de enseñanza de los distintos sistemas educativos a nivel mundial.

Así, la irrupción del internet como medio de búsqueda de información y las herramientas digitales como vídeos, diapositivas y libros electrónicos como métodos de presentación de información han facilitado el acceso de los alumnos y docentes al conocimiento a través de la generación de un entorno digital que permite a estos un acceso mas rápido y abarcativo al conocimiento.

7 0
3 years ago
Icon view, list view, and details view are all common views provided by which kind of program?
RideAnS [48]
The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Hope this helps and good luck! :)
6 0
4 years ago
Read 2 more answers
Project 15A - Math Application
vovikov84 [41]

Answer:

A simple php code for the following is given below:

Explanation:

interface Calculate {

 public function area($lenght,$width);

 public function perimeter($length,$width);

 public function surfaceArea($length_side_1,$length_side_2);

 public funcction volume($length, $width, $height):

}

interface Calculate2 {

 public function area($raidus);

 public function perimeter($radius);

 public function surfaceArea($radius);

 public funcction volume($radius):

}

Class Mian{

 

width=please Enter the value of width

height=please Enterr the value of height

length=please enter the value of length

lenght2=please enter the value of lenth of side 2

ridus= please enter the value of radius

    Circle = new circle()

    Rectangle = new rectangle()

}

Class Circle implements Calculate2{

 

public function area(){

area= pi*r

return area

}

public function perimeter(){

perimeter=2*pi*r

return perimeter

}

public function surfaceArea(){

surfacearea= pi*r*r

}

public function volume(){}

          area=area()

   volume=area*height

      return volume

}

Class Rectangle implements Calculate{

 

public function area(lenght,width){

 area= length * width

 return area

}

public function perimeter(lenght,width){

          perimenter=2(lenght+width)

          return perimeter

}

public function surfaceArea(length_side_1, withd right place){}

       surface_area 2*length_side_1  f*  length_side_2_

public function volume(){}

public surface volume(length,width,height)

 volume= length * width * height  

 return volume

}

7 0
3 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
4 years ago
Could anyone beat my typing?<br><br> https://keyma.sh/custom/33K7C
insens350 [35]

Answer:

This should not be typed in brainly. Brainly is for answering questions

Explanation:

8 0
3 years ago
Other questions:
  • An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
    7·1 answer
  • A user can easily moved to the end of document by pressing what key combination?
    8·2 answers
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • https://brainly.com/app/ask?entry=top&amp;q=What+did+you+learn+during+this+course+that+reinforces+your+belief+in+your+technology
    5·1 answer
  • If you’re presenting in a darkened room, what text and background should you use to provide maximum readability?1) Light text on
    5·1 answer
  • What is the d/c b/n information rich and information poor society​
    13·1 answer
  • Which line of code in this program is MOST likely to result in an error
    15·2 answers
  • Rideshare companies like Uber or Lyft track the x,y coordinates of drivers and customers on a map. If a customer requests a ride
    5·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!