1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
13

What is html and how does it work

Computers and Technology
2 answers:
Gnom [1K]3 years ago
8 0
Hyper Text Markup Link it works for making a site when you add coding or something of that matter
Monica [59]3 years ago
5 0
HyperText Markup Language. HyperText is the method by which you move around on the web by clicking on special text called hyperlinks which bring you to the next page. Markup is what HTML tags do to the text inside them.
You might be interested in
While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one:
Olin [163]

Answer: True

Explanation: Because anyone can post something and it can be non reliable

7 0
3 years ago
RFID can be used for all of the following applications except:_________.
serious [3.7K]

Answer:

B. Access point repeater

Explanation:

RFID can be used for all of the listed applications except for Access point repeater. This is because Radio Frequency Identification is a technology, which includes wireless data capture and transaction processing for both short and long-range applications. Usually tracking, tracing, accessing, and managing information. It can unfortunately not be used for repeating the same RFID signal or any access point for that matter.

3 0
3 years ago
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
Natasha_Volkova [10]

Answer:

cyber-extortion

Explanation:

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account. Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down, so she wired money to the appropriate account. The author of the e-mail successfully committed cyber-extortion.

7 0
3 years ago
Which of the following describes a decision support system (DSS)?
levacccp [35]

Answer:

B.

Explanation:

8 0
3 years ago
Read 2 more answers
Windows organises information on computer using a
lana66690 [7]
B folder
hope i helped
8 0
3 years ago
Read 2 more answers
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • What do you call a named collection of data stored on a disk?
    15·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • Which of the following is not hardware? wireless network router X-box 360 game controller virus scanner flat-panel monitor
    5·2 answers
  • Modify class Time2 of fig 8.5, (which is split into four pictures) to include a tick method that increments the time stored in a
    8·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
  • To verify a Windows system meets the minimum processor and memory requirements to install software, use the ________.
    8·1 answer
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
  • When you use the predict step in the IPDE process you
    8·1 answer
  • Please answer quick :(​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!