Computer Science, asked by Nastyboy, 4 months ago

I don't know the answers can you please help me​

Attachments:

Answers

Answered by ғɪɴɴвαłσℜ
3

\sf{\huge{\boxed{\red{Answer :-}}}}

a) This group is responsible for the development of the internet suite of protocols.

Defense Advanced Research Projects Agency

b) It is the process of taking ordinary text and adding extra symbols to the language.

Unicōde

c) This format is best suited for images with transparencies or low color count.

png

d) This operator performs an arithmetic operation on a variable, stores the resulting value back to the variable.

State Change Variable Operator

e) The first expression of a loop from where execution begins.

While loop

f) These are the rules that help ensure the validity of data while entering data in a table.

Access validation rules

g) This command is used to modify the structure of any existing table.

SQL ALTER TABLE Command

h) The program secretly gathers information about the user and relays it to advertisers.

Spyware

______________________________________

Similar questions