1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
14

The _____ pseudo-class represents the exact instant in which a link is activated.​

Computers and Technology
1 answer:
statuscvo [17]3 years ago
4 0
I dont know
jsoqskoqjsb iosqisj'osjq
You might be interested in
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
Nutka1998 [239]

Answer:Presentation layer

Explanation: Presentation layer is the sixth layer belonging to the OSI model . It has the functionality of presenting the data or information in a standard and formatted way.The syntax is usually error free , well defined and adequate and thus also called as syntax layer. Presentation layer works between the application layer and the network layer.

It also performs the services of compression, encryption, decryption etc.

4 0
3 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
vfiekz [6]

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

7 0
3 years ago
Describe two ways that using frames helps move data along a network
Helen [10]
Frames move bigger amounts of data through the network thus making it faster.
3 0
3 years ago
Which of the following is a locate tool that will enable you to navigate to cell M291?
scoundrel [369]

just answered it its<u><em> Go To</em></u>

3 0
4 years ago
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
    5·1 answer
  • Materials such as copper, silver, and aluminum through which electric energy passes freely are called
    13·1 answer
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • The popularity of blogging is an example of _____. the public producing the media the public regulating the media both of the ab
    15·2 answers
  • HELP PLEASE ASAP!!! Does anyone know how to fix a broken iPhone which when I connect it to the charger it comes up with the Appl
    5·1 answer
  • Will a large computer monitor have a clearer picture than using my plasma tv screen?
    9·1 answer
  • ___________ system allows us to talk to any person in the world it any time​
    15·2 answers
  • Drivers are concerned with the mileage obtained by their automobiles. One driver has kept track of several tankfuls of gasoline
    10·1 answer
  • Write a simple program that takes in a numerator and denominator and then computes the GCD for that fraction. You can assume tha
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!