1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
2 years ago
12

What is required to publish documents on the Web

Computers and Technology
1 answer:
garik1379 [7]2 years ago
4 0

Answer:

web development software, 2) an Internet connection, and 3) a web server

Explanation:

You might be interested in
________ of Willa Catha present an unadorned picture oflife on the prairies of the Midwestern United States during the19th centu
taurus [48]

Answer:

<u>"The novels"</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Based on the sentence, we can see it is mentioning an object that belongs to Willa Catha. Unfortunately, all of them can be possible correct answers based on that information so we need to check which ones make the sentence factually and grammatically correct.

Therefore the only answer that makes this sentence both factually and grammatically correct is the last answer <u>"The novels"</u>.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is
otez555 [7]
I believe this is an example of a Wireless Personal Area Network (WPAN). This type of network provides a low range wireless network that can interconnect devices near each other. So, Bluetooth devices such as a Bluetooth headset would be an example of WPAN.
5 0
3 years ago
Read 2 more answers
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I rea
professor190 [17]

Answer:

i think its 3337

Explanation:

7 0
3 years ago
Values that are sent into a function are called _________.<br><br> Program Output
Semmy [17]

Answer:

Argument

Explanation:

The function is the block of the statement which performs the special task.

when we define the function in the program then we have to call that function.

the syntax for defining the function:

type name(parameter_1, parameter_2,...){

    statement;

}

the syntax for calling the function:

name( argument_1, argument_2,...);

Meaning of parameter and argument

The argument is used to send the value into the function definition. this can be passed by value or pass by reference.

The parameter is used to receive the value send by calling function.

Therefore, the answer is the Argument.

5 0
3 years ago
Other questions:
  • The World Wide Web consists of interconnected computer networks throughout the world that everyone can use. True or False
    13·2 answers
  • A _____ is an employment test that evaluates your specific job-related abilities, such as typing speed. It is recommended that y
    6·2 answers
  • What are three steps to use to research relevant information on the internet? (Site 1)
    13·2 answers
  • Which of the following illustrates an example of a Boolean data type?
    15·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • The Business Information Building Block feature is available in the _____ grouping on the Insert tab.
    13·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. Wh
    9·1 answer
  • When can designers use rapid application development?
    8·1 answer
  • The…..executed simple
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!