1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
2 years ago
8

..............................................................................

Computers and Technology
1 answer:
Mazyrski [523]2 years ago
7 0

Answer:

Hi how can I help you?.

Explanation:

I see no question.

You might be interested in
Word can only print documents on one size of paper.<br><br> True or false
Elena L [17]

Answer:

False

Explanation:

You can always go in the document settings to change the layout and make the paper wider (landscape).

Layout > Orientation

Choose portrait or landscape

5 0
2 years ago
How Java provides protection through stack inspection approach ?
Natalija [7]
Pecting Java<span> 2's </span>stack inspection<span> policy to be enforced can-. not execute on .... Figure 2. PSLang security policy that </span>allows<span> at most 10 open windows. .... </span>Method<span> call/return: A → B. At start of B, look up</span>protection<span> domain PB for B's. code and push PB on the thread-local domain-. </span>Stack<span>. At return from B (either normally or by.</span>
3 0
3 years ago
Which of these are characteristics of compiler software? Check all of the boxes that apply. Compiler software compiles code. Com
Feliz [49]

Answer:compiler software translatesthe code into machine language

Explanation:

6 0
3 years ago
Read 2 more answers
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
3 years ago
IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​
spin [16.1K]

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

8 0
3 years ago
Other questions:
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • What is Gamekit Loa3's all questsions
    14·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    13·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • Iciples UI
    12·1 answer
  • 1.Which one of the following buttons returns a window to its original size?
    11·1 answer
  • A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
    8·1 answer
  • What is referential integrity
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!