1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
2 years ago
6

What are the groups located within developer tab? check all that apply.

Computers and Technology
1 answer:
deff fn [24]2 years ago
6 0

Answer:

controls, code, protect, and add-ins!

Explanation:

edge 2021

You might be interested in
Difference between Data and information​
IgorLugansk [536]

Answer:

Data describes figures and facts. It may consist of one entry or a collection of different values. Information describes values and context together, resulting in something meaningful.

Explanation:

3 0
1 year ago
The reason why our computers can get faster without getting bigger is because of...
Anni [7]
Almost positive it’s A. Moore’s law
3 0
2 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
2 years ago
What is the answer ????​
gtnhenbr [62]

Answer:

<h2>iv. NINGUNO DE LOS ANTERIORES</h2>

Explanation:

<h2>Hola</h2>
8 0
2 years ago
Question 4 1 pts The following code could be rewritten using: if (x &gt; 12): if (x &lt; 34):​
artcher [175]

Answer:

if(x>12 || x<34)

Explanation:

Mashing the two together using the or '||' operator would allow to run both necessary functions for the next code.

7 0
2 years ago
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • What are personal skills? A manner of individual style How a person manages and expresses oneself One's ability to excel at spor
    13·2 answers
  • The identification of critical information is a key part of the OPSEC process because: a) It is required by the JTF commander to
    13·1 answer
  • To use a stored address, C provides us with an indirection operator, ____.
    6·1 answer
  • Using a network without the network owner's permission is known as ________.
    10·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
  • Look at the code in the example below, and then answer the question.
    9·1 answer
  • Kenny is asked to submit a photo for the annual photographic competition. He decided to capture a photo with the light-painting
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!