1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
11

When you set code inside other code, in an orderly fashion, it is called:

Computers and Technology
1 answer:
V125BC [204]3 years ago
5 0

Answer:

It is called Nesting

Explanation:

or in this case B

You might be interested in
When is the POST process executed?
Olin [163]

Answer:

Below:

Explanation:

A power-on self-test (POST) is a process performed by firmware or software routines immediately after a computer or other digital electronic device is powered on.

Hope it helps.... Bro/Sis

It's Muska...  :)

3 0
3 years ago
While Joe's wife Molly and daughter Sunny did not mind moving,his son Daniel was not too happy with the sudden change in their l
Ann [662]

It means your stupid look it up!!

6 0
3 years ago
What are examples of object types that can be viewed in the Navigation pane? Check all that :
TiliK225 [7]

Answer:

2.) Forms

4.) Queries

6.) Tables

Explanation:

8 0
3 years ago
Hi Guys,
Bingel [31]

Answer:

Please check the attachment.

Explanation:

Please check the attachment.

Download docx
8 0
4 years ago
URGENT HELP PLEASE
zysi [14]

Answer:

sorry i thought i knew it sorry

Explanation:

3 0
3 years ago
Other questions:
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Windows displays a(n)
    11·1 answer
  • By default, tables are sorted in ascending order by this.<br><br><br> What’s the answer?
    12·2 answers
  • Use the drop-down menus to complete the statements about how to crop an image in a word document.​
    5·2 answers
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
  • How do you type with a keyboard?<br> (question was typed using a keyboard)
    11·1 answer
  • HELPPPPP Which tag used to add a new line:<br> A. ol<br> B. P<br> C. h1<br> D li
    7·1 answer
  • Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
    13·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
  • All of the salespeople in hyperactive media sales use laptops, so that they can take their applications and data on the road to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!