1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
1 year ago
11

A web application consists of one or more web pages. group of answer choices true false

Computers and Technology
1 answer:
algol [13]1 year ago
5 0

Answer:

true

Explanation:

web application is a software or program which is accessible using any web browser.

You might be interested in
Explain the major innavotions made from the establishment of abacus​
fredd [130]

Answer:

The major innovations made from the establishment of abacus​ is explained below in details.

Explanation:

Industrial Age - 1600

John Napier, a Scottish aristocrat, and statesman dedicated much of his relaxation time to the knowledge of mathematics. He was particularly involved in devising ways to aid calculations. His greatest offering was the discovery of logarithms. He recorded logarithmic measures on a set of 10 boarded rods and thus was capable to do multiplication and division by equaling up numbers on the sticks. These enhanced identified as Napier’s Bones.

5 0
3 years ago
How has science fiction influenced technology
BlackZzzverrR [31]
<span>www.smithsonianmag.com/science.../ten-inventions-inspired-by-science-fiction-1280...</span><span>this web address should answer your question</span>
5 0
3 years ago
Read 2 more answers
In additon to setting up services, what other tasks does a sysadmin have to keep in mind? check all that apply.
kotegsom [21]

Tasks that a sysadmin have to keep in mind are:

  • Security Patches (A secure network is an important responsibility for SysAdmin)
  • Routine Updates (services need to be updated)
  • Maintain Compatibility

<h3>What is sysadmin?</h3>

A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers.

The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage meet the needs of the users, without exceeding a set budget when doing so.

To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or supervise staff; or offer technical support for projects.

Learn more about SysAdmin

brainly.com/question/20381778

#SPJ4

5 0
1 year ago
An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
Margarita [4]

Answer:

Copy, distribute, and remix

Explanation:

Creative Commons is not for profit international network and organisation with head quarters in America that enables the discovery of material that are openly licensed so as to be available for use by others fostering the possibility to gain educational insight to creative works to serve as foundation for their own works legally. Creative Commons provide CC licences that are accessed by content creators with a desire to share their creativity on the web.

8 0
3 years ago
The rectangle shape in flowchart is used for
kvasek [131]
<h2>Start</h2>

The rectangle shape in flowchart is used to capture process steps like basic tasks or actions in your process.

4 0
2 years ago
Other questions:
  • Numeric data is stored in ___________ for direct processing.
    10·2 answers
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Which type of network topology has a central networking device which manages the network and acts as a communications conduit fo
    7·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • after pouring concentrated disinfectant on larger drops or pools of blood how much contact time should be allowed before attempt
    8·2 answers
  • What can happen if you do not follow the directions when cooking or baking? (Give 4 examples in a sentence each)
    8·1 answer
  • Tier 1 networks form the internet ____.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!