1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
6

Which of the following is the language used to create content that is shown on the World Wide Web?

Computers and Technology
2 answers:
kondor19780726 [428]3 years ago
6 0
Your answer is HTML. 
kirill115 [55]3 years ago
6 0
I think java script would be the right answer
You might be interested in
What can be controlled through IoT? Choose four answers.
Maru [420]

<em>The answer is: </em>

<em> </em>

<em>Door locks, light switches, security cameras and desktops (even laptops too) </em>

<em> </em>

<em>When we say Internet of Things, it is basically all objects that can be connected to internet (objects that are parts of our daily lives) can be included in this phrase or quote). There are technologies pertaining to common household items such as locks, switches and cameras that can be controlled through the use of phones and internet. These things collect and stores data such as names, fingerprints, pictures and scans that are used for verification and authentication purposes. </em>

<em> </em>

<em />

5 0
3 years ago
You've finished programming the app! Now your company has to decide whether to use an open source
pishuonlain [190]

Answer:

Proprietary License gives you full ownership and trademark/patent opportunites. Open source allows for code donation and a community based development for your app. Generally speaking, if your a private entity creating an app for a client, you'll need the Proprietary Licence, which will allow you to sell the codebase to your client.

If your creating an app for your company as itself, you go either way, sell the license in licensing agreements, or have your companies community contribute and better your app from the inside.

Its entirely based on the agreements you set for the app.

5 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
A computer uses a memory unit with 256k words of 32 bits each. A bina.ry
iogann1982 [59]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

4 0
3 years ago
Other questions:
  • A(n ________ cpu has two processing paths, allowing it to process more than one instruction at a time.
    15·2 answers
  • What Coding program does UNITY use?
    6·1 answer
  • CHKDSK is a system utility that is commonly found in Windows. What is CHKDSK? Use the Internet to research and write about CHKDS
    15·2 answers
  • :3 Brainlsit included! =) 33 points!
    10·1 answer
  • What is predictive dialing?
    12·1 answer
  • Which operating system (OS) is used to run your laptop?
    15·2 answers
  • What do you notice about the cinematography
    14·1 answer
  • In which languages the dynamic web pages are written?<br>​
    10·1 answer
  • Why is it important to create a web maintenance schedule? Check all of the boxes that apply.
    9·1 answer
  • Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!