1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
10

What is the name of the function below? function go(){ alert("hello everybody"); }

Computers and Technology
1 answer:
labwork [276]3 years ago
6 0

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

You might be interested in
Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
mina [271]

Answer:

The answer to this question is given below in the explanation section.

Explanation

Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely are:

  1. Linux
  2. OpenBSD
  3. FreeBSD
  4. NetBSD
  5. AROS
  6. Tock
  7. FreeDOS
  8. Dragonfly BSD
  9. Qubes OS
  10. Haiku
  11. Redox
  12. ReactOS
  13. Subgraph OS
  14. osv.io
  15. ToaruOS
  16. Mezzano
  17. House
  18. Minoca OS
  19. SOS
  20. PowerNex
  21. Interim OS
  22. KolibriOS
  23. MINIX
  24. HelenOS
  25. Sculpt
  26. Harvey
  27. illumos
  28. GeckOS/A65 V2.0
  29. Serenity
  30. GNU Hurd
  31. Plan 9
  32. AquilaOS
  33. Biscuit
  34. Xv6

These are the different opensource operating systems.

3 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
Kaylis [27]

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

8 0
3 years ago
Read 2 more answers
Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
raketka [301]

Solution :

'AND" operation is a logical operation and is used in logical connective combining two statements and in truth tables.

Using AND operation verifies whether the outcome P and Q is true only when both the P as well as Q are true.  If one of the P or Q is not true, then outcome result will be false.

In the context, Kamal wishes to offer a new and more favorable contracts to the business customers who use a wireless services and receive a discount.

Therefore, using the AND operation of the customers as :

Customer     Wireless     Discount     Outcome

   A                   N                   N             FALSE

   B                   Y                   N             FALSE

  C                   N                   Y              FALSE

   D                   Y                   Y             TRUE

   

8 0
3 years ago
Tribology is a branch of physics concerned with friction in mechanical motion. Knowledge of tribology would be useful working wi
katovenus [111]

Answer: C conventional hard disk drives

Explanation: hope this helps! (:

4 0
3 years ago
Other questions:
  • Java - Given a String variable response that has already been declared, write some code that repeatedly reads a value from stand
    12·1 answer
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • What is binary number
    11·1 answer
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • The Springfork Amateur Golf Club has a tournament every weekend. The club president
    7·1 answer
  • Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that
    8·1 answer
  • Which two statements are true about algorithms?
    15·2 answers
  • There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
    8·2 answers
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • The Baltimore Sun reported on a study by Dr. Sara Harkness in which she compared the sleep patterns of 6-month-old infants in th
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!