1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
2 years ago
5

18) What is masking in Flash?

Computers and Technology
1 answer:
sammy [17]2 years ago
6 0

Answer:

Ok thanks, I guess?

..............

You might be interested in
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
Which reports indicate how traffic arrived at a website?.
tatyana61 [14]

Answer:

Direct traffics.

Explanation:

This channel refers to those traffics that came directly and without any via.

8 0
2 years ago
Write any four common hardware devices​
marishachu [46]

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

8 0
3 years ago
In Microsoft Exel, graphs are refered to as_________
algol [13]
The answer is charts D since tables are still referred to as tables
4 0
3 years ago
In programming 2+6 is an example of what math
In-s [12.5K]

Answer:

beinggreat78~here~to~help.

2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of <em>string concatenaction,</em> the term used for combining two strings into one, or a variable into a string.

5 0
2 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST&gt;
    13·1 answer
  • Write a program reverse-order.cpp which asks the user to input two dates (earlier date then later date). The program should repo
    13·1 answer
  • Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?
    10·2 answers
  • What is the program that searches through data bases?
    10·1 answer
  • After completion of this chapter, you should be able to:  Describe the structure of an IPv4 address.  Describe the purpose of
    5·1 answer
  • In Windows Vista, which button is used to create a new folder?
    7·1 answer
  • Copyright applies to work at the time it was produced, written, and developed. True or False?
    10·2 answers
  • The __________ is a worldwide collection of networks that links millions of businesses, govenment agencies, educational institut
    14·1 answer
  • Is the following statement true or false?
    12·1 answer
  • Many bookstores have closed since the rise of the Internet. What type of
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!