1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
10

What is the name of the function below? function go(){ alert("hello everybody"); }

Computers and Technology
1 answer:
labwork [276]3 years ago
6 0

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

You might be interested in
A ________ database state is one in which all data integrity constraints are satisfied
beks73 [17]
A consistent database base is one in which all data integrity constraints are satisfied.
8 0
3 years ago
Read 2 more answers
Do you think communities or countries can survive without the internet?why or why not?​
abruzzese [7]

Answer:

here

Explanation:

Generally, very few will survive without internet and some technology geek will die overnight due to lack of things to research. Most of the brand and business will lose their online presence in no internet mode

7 0
3 years ago
A.Distance sensor<br> b.Programable microcontroller<br> c.Ambient light sensor<br> d.Wi-Fi
Rainbow [258]

D WiFi

It uses wifi to connect to the internet

3 0
3 years ago
Read 2 more answers
________ software provides a means of sharing, distributing, and searching through documents by converting them into a format th
Alexus [3.1K]
The answer to this question is Document Management Software.

Document Management Software or DMS is a computer system or software that is used to store, share, manage, and distribute documents by converting paper based documents into an electronic image that can be viewed by any user. The converting of documents is through the use of a scanner, and the document management software will enable the users to manage the electronic documents or data.
3 0
3 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
Other questions:
  • python If the checksum is 10, the last digit is denoted as X according to the ISBN-10 convention. Write a program that prompts t
    10·1 answer
  • A very simple device that connects network components and sends packets of data to all other connected devices is called a _____
    5·1 answer
  • Which of the following is NOT a benefit of safety and health programs?
    11·1 answer
  • How do governments correct for negative externalities?
    5·1 answer
  • Which one is correct
    8·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
    13·2 answers
  • How many passes will it take to find the four in this list? 4, 5, 6, 7, 8, 9, 10 1 2 3 4
    12·2 answers
  • In French class, Blue puts on a visor and the environment changes to that of a café in Paris. Which of the following terms descr
    12·2 answers
  • What is an advantage of storing data in a Data Lake, without applying a specific schema to it initially?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!