1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
2 years ago
5

What does xhtml stand for?

Computers and Technology
2 answers:
kari74 [83]2 years ago
7 0
<span>EXtensible HyperText Markup Language

</span>
igomit [66]2 years ago
3 0
Extensible Hypertext Markup Language.
You might be interested in
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Which of the following is true for an API?
navik [9.2K]

Answer:

c

Explanation:

4 0
3 years ago
Which type of device log contains the most beneficial security data?
zhuklara [117]
The security Log is your Answer.
6 0
2 years ago
A media strategy that involves high ________ most likely involve creating broad exposure using many media vehicles, while a stra
Tom [10]

Answer: Reach and frequency

Explanation:

 The media strategy is the planning and action that basically involve high reach in the exposure by using the media vehicle. It basically improve the overall conversation rate of customers.

The conversation rate is refers to the total percentage of the users which involve using the website and various applications.

This strategy also involve with high frequency that limited the list of the media vehicle.

 

5 0
3 years ago
A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
valkas [14]

Answer:

The correct answer to the following question will be "Application program".

Explanation:

  • Applications include database programs, word processors, browsers, development tools, picture editors, and platforms for communication.
  • It use the OS (Operating System) of the computer and many other assisting programs, frequently system software, to work.
  • An application program is a detailed, body-contained program that directly works a given function for just the user.

There are some examples of application programs such as:

  • Includes various bundled software.
  • Addresses an organization's data management and application requirements, covering all divisions.
  • It allows users can create and manage information.
  • Used primarily to get content access without editing.

6 0
3 years ago
Other questions:
  • What is life all about?
    15·2 answers
  • HELP I don't understand this
    14·2 answers
  • Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
    10·2 answers
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Randy earn $22 per hour. This is an example of
    11·1 answer
  • When addictions escalate and the individual loses his or her job or drops out of school, _______________.
    12·2 answers
  • Which of the following types of computers is typically used by governments and hospitals and can support hundreds of users?
    6·2 answers
  • One key feature of malware is that it:
    13·1 answer
  • What influences my school my church and my leader on my society​
    8·1 answer
  • ________ is interpreted. Group of answer choices A. Python B. C C. C D. Ada E. Pascal
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!