1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
4 years ago
3

Adam would like to create an interactive puzzle on his company's web page that will keep customers interested in the site. What

can he use to accomplish this?
A. XML
B. HTML
C. DHTML
D. WYSIWYG
Computers and Technology
1 answer:
dimulka [17.4K]4 years ago
6 0
The answer to the question is the letter " C" DHTML.

The DHTML stands for "Dynamic HyperText MarkUp Language" is a collection of data used to create interactive and animated web sites. If Adam would like to create an interactive puzzle on his company's web page, he needs to use this DHTML.
You might be interested in
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
Progressive places its messages on local radio stations and in the yellow pages of the phone book. These communications are dire
Alexandra [31]

Answer: Receiver

Explanation:  

The receiver basically is used in the communication channel where the person decode its output and message in the form of useful data or information.

The main function of the receiver is to provide the path between the transmitter as an output and receiver as an input. The receiver basically process the received signal for recovering the proper message signal. It basically receive the input signal and covert it into useful data.

7 0
3 years ago
Can you list one property of each of the following?<br> Excel<br> Word<br> Powerpoint
Rudiy27
Exel is used for graphing, Word for any type of essay or paper, and Powerpoint for presentations.
Hope this helps!
4 0
3 years ago
Read 2 more answers
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current dir
dimulka [17.4K]

Answer:

50-64

Explanation:

We know this because I said so

5 0
4 years ago
Other questions:
  • TRUE OR FALSE!!!!!
    6·2 answers
  • Describe the benefits and drawback of using virtualisation on a single machine and also in a cluster environment
    10·1 answer
  • What did the Copernican revolution demonstrate?
    15·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • You can select multiple words by using the ______ keys repeatedly.
    6·1 answer
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory
    7·2 answers
  • Create two functions to calculate the area and circumference of the circle using pointer.
    12·1 answer
  • 14 Copy a picture of a crane on the next page. Do not trace them. Make a freehand sketch. (2) 2 Look at the placed where the Mar
    11·1 answer
  • Once you fix the bug in a code, what is the last thing you should do?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!