1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
2 years ago
8

Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?

Computers and Technology
1 answer:
Alex787 [66]2 years ago
4 0

Answer:

b.HTML

Explanation:

HTML (Hyper-Text Markup Language) and it was the primary language for developing the websites those days. With the evolution of internet market, the transformation of simple, static HTML websites to dynamic websites was the first thing to come up.

You might be interested in
what are the three parts to physical security standards for various types of army equipment and the risk level
zzz [600]

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

<h3>Further explanation</h3>

Physical security is the part of security concerned with physical measures designed to protect the assets and facilities of the organization.  

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

Access control is a security technique in which regulates who/what can view/use resources in a computing environment. The example of physical access control is the locks, badge system, and security guard.

Surveillance is the condition in which the architects seek to build spaces that are more open to security personnel and authorized users. It is also the continuous monitoring of, for example, the disease occurrence. The example of surveillance is Closed-circuit television cameras (CCTV) placed in the streets.

Security testing is the evaluation and testing the information security of hardware, software, networks, and IT environment. Error handling and specific risky functionalities are examples of security testing

<h3>Learn more</h3>

1. Learn more about the security practice in electronic banking brainly.com/question/7668763

 

<h3>Answer details</h3>

Grade:  9

Subject: Computers and Technology

Chapter:  Physical security standards

Keywords:  physical security, access control, surveillance, security testing

3 0
3 years ago
Fullform of mips plz ​
DedPeter [7]

Million instructions per second (MIPS) is an approximate measure of a computer's raw processing power.

7 0
3 years ago
Solution is c language please help me.​
nordsb [41]

Explanation:

in c++

#include<iostream.h>

#using namespace std;

main()

{ float x,y,z,r, phi, theta;

cout<<" enter the value of x";

cin>>x;

cout<<" enter the value of y";

cin>>y;

cout<<" enter the value of z";

cin>>z;

r = (sqrt(pow(x,2) + pow(y, 2) + pow(z, 2)));

phi = (asinf(y/r)*180.0f)/PI;

theta = (asinf(-x/(r*cosf(phi)))*180.0f)/PI;

cout<<"The radius r= "<<r;

cout<<"The phi angle= "<<phi;

cout<<"The theta angle= "<<theta;

return 0;

}

4 0
3 years ago
Unnecessary duplication of data in a database is referred to as:.
harina [27]

Answer:

Data Redundancy

Explanation:

It is a data organization issue that allows the unnecessary duplication of data within your Microsoft Access database.

Hope this helps ^v^

3 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Other questions:
  • Consider the pseudo-cpu discussed in class. the instruction format is 16 bits, which is subdivided into 4-bit opcode field and 1
    14·1 answer
  • Is this statement true or false?
    13·1 answer
  • How can a Word user insert a page break into a document to isolate a table on a new page?
    13·2 answers
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • How do you access the Control Panel?
    7·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • Update thejavafile names to include your initials at the end, send .java file only.1. Completein-place heapSort, which takes an
    11·1 answer
  • make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage sm
    8·1 answer
  • Explain with examples what is software​
    6·1 answer
  • When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the sa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!