1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
7

Why is it preferable to code web pages in HTML format?

Computers and Technology
1 answer:
balu736 [363]3 years ago
5 0

Answer:

its c on plato

Explanation:

You might be interested in
Components Of Desktop System?<br><br><br><br><br><br><br>Thanku! :)<img src="https://tex.z-dn.net/?f=%20%5C%3A%20" id="TexFormul
trapecia [35]

components Of desktop system:

  • motherboard { backbone of the computer system controlling all tasks }
  • RAM { temporary random access memory }
  • ROM { stores huge amount of data ex - photos, videos }
  • CPU { central processing unit which processes data }
  • GPU {graphical processing unit for video editing, 3D graphics rendering}
6 0
3 years ago
Which describes an operating system this is multitasking
xxMikexx [17]
Okay, a Multitasking Operating System(OS) allows you to run many processes (or tasks) <span>"simultaneously".

</span><span>They do not actually run at the same time, of course, since there is only one CPU.
</span>They have to take turns working but they do it really fast (:

Also, if your CPU has multiple cores then you can, run one task on one core, and another on the other core, depending of course on how many cores you CPU has e.g. Quad-Core, Dual-Core, Eight-Core.
5 0
3 years ago
The COSO internal control framework identifies five components of an entity's internal control. Which, if any, of those five com
Llana [10]

Answer:

The COSO internal control framework identifies five components of an entity's internal control.

Which, if any, of those five components of Avon's internal control were flawed?

Of those five components of Avon´s internal control the following were flawed:

1) Information and communication

2) Monitoring

3) Control environment

Explanation:

1) Avon’s global internal audit staff thought about offering CPA provisions´s training to the employees, but it never happended due to budgetary limitations, nor it was informed or communicated to them. It was uncovered that the payments were being made to Chinese government officials in 2005,  however working for a U.S. Company, those bribes were not allowed.}

2) Monitoring: In December 2006, Avon’s global internal audit staff followed up doubtful  activity regarding this matter, but there was no monitoring or evaluations that the deficiencies within the internal control were changed to legal practices.

3)  This is a major internal control flaw as Avon discovered that there were illegal bribes being paid to Chinese government officials, thought about informing their employees that is was unacceptable but then chose not to, and finally was surprised when the bribes continued for another year.  This demonstred a lack of commitment to integrity and ethical values.  

7 0
4 years ago
Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
Alenkasestr [34]

Answer:

True.

Explanation:

When there is delay and congestion in the network, we have to assign priority to some packets to avoid data loss. Class of service (CoS) does this prioritization by grouping similar traffic types such as ,voice, streaming video,e-mail etc. into classes.then it utilizes different levels(usually eight) of priority.It also modifies PCP field in 802.1q tag.

4 0
4 years ago
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
Other questions:
  • . Consider the following brute-force algorithm for evaluating a polynomial. ALGORITHM Brute Force Polynomial Evaluation(P[0..n],
    14·1 answer
  • All of the following are report sections EXCEPT (Points : 4) detail.
    11·1 answer
  • What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
    15·1 answer
  • Placeholders for fields such as "Last Name" and "Address" would be inserted into which
    11·1 answer
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • A router is a peripheral that may need troubleshooting if the network goes down.
    12·2 answers
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • The engine that runs the computer. Small computers have one, while larger computers may
    15·1 answer
  • tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
    6·1 answer
  • How to add links in HTML? ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!