1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
4 years ago
15

The Internet shopping cart is an example of which version of the web?

Computers and Technology
1 answer:
andrew-mc [135]4 years ago
6 0
Amazon or any other aka this could be shopping online version of the web hopefully this helped
You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
How does and employer judge a candidate
nlexa [21]

Answer:

Explanation:

An employer can judge a candidate from these factors.

1) Confidence Level

2) Way of talking

3) Written or screening test

4) Experience Level

5) Resume

6 0
3 years ago
2. Which of the following functions adds a range of cells and then divides by the number of cell entries? *
postnew [5]
Hello Mate. Good Works!

Answer: B) Average
*The numbers entered will be divided.

Kind Regards
5 0
4 years ago
Read 2 more answers
Andie visits a webpage that features a dancing monkey that changes dance moves when she hovers over it. Which of the following w
Ilia_Sergeevich [38]

The programming language which was most likely used to create this mouse-hover feature is: d. Python.

<h3>What is a scripting language?</h3>

A scripting language is also referred to as a script and it can be defined as a type of programming language which comprises a set of executable codes (instructions) within a file that are executed by the operating system (OS) of a computer or software program (application) such as a webpage.

Scripting languages are typically used to give instructions or commands to software programs (application) such as:

  • A web browser.
  • A server.
  • A standalone application.

<h3>Examples of a scripting language</h3>

In Computer programming, some examples of commonly used scripting languages include the following:

  1. JavaScript
  2. PHP
  3. Ruby
  4. Python

In this scenario, a Python program would be used to define a function that gets called every time an end user (Andie) moves his or her mouse over the the dancing monkey.

Read more on Python program here: brainly.com/question/6957007

3 0
2 years ago
When encoding information, which of the five senses has been shown to be more durable and last longer in memory?
Llana [10]
<span>Olfactory memory tends to be the most durable. Surprisingly, smells tend to be the most strongly related with memories. This has been shown by people being able to associate smells with events for longer periods than any other sensory input. Most other inputs only stay in memory for a period of milliseconds, up to 2-4 seconds at the most.</span>
8 0
3 years ago
Other questions:
  • Which spreadsheet operation does a look function perform?
    5·1 answer
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • PLEASE HELP ASAP<br> Which technology encrypts traffic between a web browser and a website?
    10·2 answers
  • 1. How do you know that A Drop of Water is an expository<br> text? GENRE
    7·1 answer
  • Conflict on cross-cultural teams
    12·2 answers
  • De que material esta hecho la pantalla de la computadora​
    12·1 answer
  • When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to
    6·1 answer
  • Only the root user can modify a file that has the immutable attribute set.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!