1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
9

Which can be inserted using the insert panel in dreamweaver cc?

Computers and Technology
1 answer:
timofeeve [1]3 years ago
3 0

Answer: Learn how to use the Insert panel in Dreamweaver to create and insert objects, such as tables, images, OAM files, and Bootstrap components. The Insert panel contains buttons for creating and inserting objects such as tables and images. The buttons are organized into categories.

You might be interested in
What is a document you can create with word-processing software
madam [21]

Answer:

Word processing software can easily create, edit, store, and print text documents such as letters, memoranda, forms, employee performance evaluations (such as Appendix A), proposals, reports, security surveys (such as Appendix B), general security checklists, security manuals, books, articles, press releases, and ... I think the answer is this

6 0
3 years ago
What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
vaieri [72.5K]

The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

<h3>What is replay attacks in security?</h3>

A replay attack is known to be a kind of security attack that is known to be done if  or when a cybercriminal is said to spy on a secure network communication.

Note that by this, they tend to intercepts the message  and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that  the hacker wants.

Hence, The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

learn more about  digital data from

brainly.com/question/28346439

#SPJ1

8 0
1 year ago
What is the purpose of a title slide on power point
ArbitrLikvidat [17]
It would be D because whenever there is a title slide, you get an idea of what you are talking about

8 0
3 years ago
Read 2 more answers
Owning provides _________ flexibility but can lead to _________ costs in the long-term.
4vir4ik [10]

Owning provides less flexibility but can lead to lower costs in the long-term.  Correct answer:D

Less flexibility because you can change it or modificate it not so easy.

But owning also means that you don't have to pay rent or pay for it monthly, and that way you will save money in long term.

8 0
3 years ago
Read 2 more answers
__________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
babymother [125]

Answer:

The correct answer to the following question will be "Run-length encoding (RLE)".

Explanation:

RLE seems to be useful for replicated information, swapping it with a qualify as well as a copy of something like a repeat element.

  • Optimized dictionary strategies construct a table of sequences, then substitute appearances of chords with simpler codes.
  • This is a straightforward type of data compression, where data runs become stored as an individual data count as well as a value rather than as the initial run.

8 0
3 years ago
Other questions:
  • What bus carries a status signal back to the CPU?
    14·1 answer
  • To write 10 lines of code on paper:
    10·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • Most operating systems today primarily use a ____.
    12·1 answer
  • What command is most effective at identifying different types of files?
    6·1 answer
  • What if you accidentally delete your browser history
    7·1 answer
  • Please help me asapppp!​
    8·2 answers
  • Algorithm to eat orange<br><br>​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!