1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
15

Which of the following views would you use to see your Web page while working on it?

Computers and Technology
1 answer:
brilliants [131]3 years ago
8 0
D) Alt Tags thats the answer i think
You might be interested in
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
3 years ago
Read 2 more answers
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
3 years ago
The Internet is written in a "language" called
olganol [36]

Answer:

HTTP

Explanation:

I hope it helps u.

Mark Me as brainlist answer

4 0
3 years ago
Read 2 more answers
Why do network connections show different network on ethernet on two computers?
jekas [21]
Because they're on different networks. There are networks everywhere. Your home probably has it's own network which connects to the internet, which is a BUNCH of networks. Your school (should have) has several networks, eventually connecting to the internet.
5 0
3 years ago
Tina wants to make a quiz using a presentation for her students. The presentation will have a question with multiple answers om
evablogger [386]

Answer: Question is not clear ,But an example python code is below..

Using only Beginner Level IF-ELIF,ELSE,NESTED IF statements :)

Explanation:

print("Welcome To Quizzy Quizes")

print("Q 1. Do elephants bath everyday?")

x=str(input("Enter Yes/No :"))

if x == 'yes':

   print("correct answer!!")

else :

   print("Wrong ,try again")

   

a= str(input("Do you want to Continue Playing?"))

if a == 'yes':

   print("Loading...")

else:

   exit()

   

print("Q.2 have you ever had been too serious that u had street Fight with someone?")

y = str(input("enter yes/no:-"))

if y == 'yes':

   print("WHY SO SERIOUS? HEHE")

else :

   print("Why so Poor,Have some fight !")

print("Q.2  Hero or villain for a day? ")

z  = str(input("enter Answer:"))

if z == "hero":

   print("Which SuperHero ?")

   b = str(input("Enter Answer:"))

   print("Great Selection, Now Save the World")

if z == "villain":

   print("Which Villain?")

   c = str(input("Enter Villain name:"))

   print("great selection , Now get ready to destroy the world")

   

7 0
3 years ago
Other questions:
  • What's a qat on a computer
    12·2 answers
  • Your company has recently been hired to install a smart security system for a large office building. The system will include sec
    12·1 answer
  • Declaring single arrays is done with a0 set(s) of straight brackets.
    10·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • Sales representatives want to capture custom feedback record details related to each Account. The sales reps want to accomplish
    12·1 answer
  • Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insult
    14·1 answer
  • Grace is the editor of her school newspaper. Which feature of a word processing program would she use to make her changes visibl
    7·2 answers
  • ¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
    6·1 answer
  • The density of mercury is 13.6 grams per cubic centimeter. Complete the steps for converting 13.6 g/cm3 to kg/m3.
    9·1 answer
  • 2.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!