1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

The html ________ defines items on a web page such as graphics, tables, and headers as objects. dom ssl json mime

Computers and Technology
1 answer:
Gnesinka [82]3 years ago
7 0

<span>DOM</span>

The Document Object Model (DOM) is a World Wide Web Consortium standard that defines a standard for accessing documents. It is platform and language-neutral. It allows programs and scripts to dynamically access and update the content, structure, and style of a web page.

You might be interested in
Who would be a member of the American Dental Association?
ycow [4]

Answer:

a pratcing dentist

Explanation:

4 0
3 years ago
what is happening when humans control the breeeding of living things to favor certain desired features
sweet-ann [11.9K]
Selective Breeding is happening.
6 0
3 years ago
What when can you expect technology to be effective?
loris [4]

Answer:

we dont have to expect , the technology are effective , as each day the technology are being advance and developed day by day. each day the technology are being more and more effective. they are effective now and they will be effective in future too

3 0
3 years ago
When evaluating the validity of a website beyond its URL, you can practice the "rule of 3" which means
Schach [20]

Any information on a website should be findable within 3 mouse clicks.

5 0
3 years ago
Read 2 more answers
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
Other questions:
  • Create a Python program as described below and save it in a file named bool. You should use IDLE or similar environment to creat
    15·1 answer
  • Before using the data type string, the program must include the header file ____.
    6·1 answer
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • Write a Python program to do the following:
    12·1 answer
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • What type of version of visual studio is the visual studio express
    8·1 answer
  • Que es el sistema persona producto?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!