1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
10

A browser is an example of a​

Computers and Technology
1 answer:
Inessa [10]3 years ago
3 0

Answer:

User Interface, Website

You might be interested in
Which actions changed the look of the following word?
jarptica [38.1K]

Answer:

D

Explanation:

The actions applied to change the look of the word are:

1. It was set to italics. This can be done easily by highlighting the word => press Ctrl + I together on the keyboard.

2. Next is to set to underline. While still highlighted => press Ctrl + U together in the keyboard.

6 0
3 years ago
Read 2 more answers
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
If your computer will not turn on, What is something you can would you use to diagnose the problem?
inysia [295]
3. See if its plugged in
3 0
3 years ago
Read 2 more answers
A space in a document that is typically in templates to hold pictures or text until the final text is inserted is called a _____
yKpoI14uk [10]

Answer:

D. placeholder

Placeholder are like the field you enter your username and passwords and etc. They can be easily understood my the name itself!

Hope this is the correct answer!

Bye!

6 0
4 years ago
Read 2 more answers
def getCharacterForward(char, key): """ Given a character char, and an integer key, the function shifts char forward `key` steps
zhenek [66]

Answer:

  1. def getCharacterForward(char, key):  
  2.    charList = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
  3.    if(len(char) > 1):
  4.        return None  
  5.    elif(not isinstance(key, int)):
  6.        return -1
  7.    else:
  8.        index = charList.find(char)
  9.        if(index + key <= 25):
  10.            return charList[index + key]
  11.        else:
  12.            return charList[(index + key)% 26]
  13. print(getCharacterForward("C", 4))
  14. print(getCharacterForward("X", 4))

Explanation:

Firstly, define a charList that includes all uppercase alphabets (Line 2). We presume this program will only handle uppercase characters.

Follow the question requirement and define necessary input validation such as checking if the char is a single character (Line 4). We can do the validation by checking if the length of the char is more than 1, if so, this is not a single character and should return None (Line 5). Next, validate the key by using isinstance function to see if this is an integer. If this is not an integer return -1 (Line 6 - 7).

Otherwise, the program will proceed to find the index of char in the charList using find method (Line 9). Next, we can add the key to index and use the result value to get forwarded character from the charList and return it as output (Line 11).

However, we need to deal a situation that the char is found at close end of the charList and the forward key steps will be out of range of alphabet list. For example the char is X and the key is 4, the four steps forward will result in out of range error. To handle this situation, we can move the last two forward steps from the starting point of the charList. So X move forward 4 will become B. We can implement this logic by having index + key modulus by 26 (Line 13).  

We can test the function will passing two sample set of arguments (Line 15 - 16) and we shall get the output as follows:

G

B

8 0
3 years ago
Other questions:
  • A(n) __________ is a software package that usually consists of a text editor, a compiler or interpreter, and tools to test and d
    14·1 answer
  • At which layer of the osi model is the entire message referred to as the payload
    15·1 answer
  • Critics of media consumption
    10·2 answers
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Write a program that will manipulate Rectangle objects for which you will create a Rectangle class.
    5·1 answer
  • A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were se
    15·1 answer
  • Learning how to use word processing and spreadsheets, and creating presentations are all considered __________ computer skills.
    15·2 answers
  • Draw a flowchart diagram for a program that display a person's name x times​
    5·1 answer
  • Need answer ASAP
    14·1 answer
  • These operating systems use a graphical user interface.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!