1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
2 years ago
10

A browser is an example of a​

Computers and Technology
1 answer:
Inessa [10]2 years ago
3 0

Answer:

User Interface, Website

You might be interested in
What are informational sessions?
arsen [322]

Answer:B

Explanation:

7 0
3 years ago
Write a Python program to convert the characters to lowercase in a string
wel

Answer:

Following is the program in the python language

st = 'sAN RaN'  #String

print(st.lower()) #display into the lowercase

Output:

san ran

Explanation:

Following are the description of program

  • Declared and initialized the string in the "st" variable .
  • The lower function in python is used for converting the uppercase string into the lower case string .
  • Finally in the print function we used lower function and display the  string into the lower case
8 0
3 years ago
Select the correct answer.
tia_tia [17]

Answer:

A

Explanation:

HTML is a coding language.

8 0
3 years ago
Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
algol [13]

Answer:

Option (D) using the private access specifier on the class fields

Explanation:

  • The private access modifier can be used to hide the data.
  • Methods and data variables ( fields ) can be declared with the private access modifier.
  • Data hiding is a OOPS Concept which can be achieved with the private keyword (private access modifier).
  • The access modifiers are of types Public, Private, Protected and Default ( no access modifier - no need to explicitly specify the default keyword).
  • Data hiding means to hide the data, the data is contained in the class variables.So, option (d) using private access modifier on the class fields is correct option.
  • Option (A) is wrong as the using the public access modifier doesn't hide anything. It is public and is visible to the public.
  • Option (B) is wrong as using the private access modifier on the methods means it is hiding the implementation of the methods not the data.
  • Option (C) is wrong as using private access modifiers on class definition means making the classes not visible to other classes it doesn't mean data hiding as the data is contained in the class variables.
7 0
3 years ago
24 3 Ans a. Define the term computer hardware. b. C. What are input devices? List any two input devices. What is processing devi
marysya [2.9K]

Explanation:

hardware are the physical parts of the computer which can be touched seen and felt is called hardware.

the device which are use to inter data and instructions from the user is clawed input device. foreg; keyboard , mouse.

the processing device of computer is cpu

the printed information which can be touched and seen is Called hardcopy .

soft copy are which can be seen but not touched is called soft copy .

the device that are use to store data and instructions is called storage devices.

8 0
2 years ago
Other questions:
  • Help asap. 10 points.
    8·2 answers
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • When was unicode invented?
    13·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inve
    10·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • Rachael has been posting negative comments on several of her peers' social media pages. Which of the six Ps is Rachael abusing?
    15·1 answer
  • What command displays detail information about the OSPF interfaces, including the authentication method?
    7·2 answers
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!