1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
6

What software in windows 8 serves as built-in antivirus software?

Computers and Technology
1 answer:
Llana [10]3 years ago
6 0
It is called 'Windows Defender'
You might be interested in
Identify tags and attributes in HTML 5
Vaselesa [24]

Answer:

Tags can be identified as they are written as <tagname> Something </tagname>

<tagname> this tag is called start tag.

</tagname> this tag is called as end tag.

for ex:<p> This is a paragraph </p>

There are some elements with no end tag.for ex:- <br> tag.

Attributes are used to provide additional information to an HTML element.

Every element can have attributes.

for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>

So the background of h1 will become red.

7 0
3 years ago
Select the correct answer from each drop-down menu.
tia_tia [17]

Answer:

<dd> tag is used

Explanation:

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

6 0
3 years ago
Which attributes does not come in tag?
Ne4ueva [31]

Answer:

length is your answer

Explanation:

Have a great day! ^-^

can you me as brainliest if its right? i need 10000 points and 35 brainliest's to rank up to genius

4 0
3 years ago
Read 2 more answers
How would I CAST this variable to a STRING?<br> teeth = 32
maria [59]

Answer:

By using the str() function.

teeth = 32

print(str(teeth))

Explanation:

The str() function returns the string version of the given object.

4 0
4 years ago
To remove any hidden data from your document before sharing it, what should you do?
almond37 [142]
B. becasue the repeation of a b and c i assume its not d, for that could be too easy it says REMOVE so that being the key word i ruled out A and C
4 0
3 years ago
Other questions:
  • How do computers find servers, requests information from the server, and receives it?
    12·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • When was internet created in which year​
    13·2 answers
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • What is the difference between a workbook and a worksheet?
    14·2 answers
  • Gabby is creating a game in which users must create shapes before the clock runs out. Which Python module should Gabby use to cr
    15·2 answers
  • What permissions are needed in order to use a work online that is in the public domain?
    8·1 answer
  • Which of the following is NOT a method for applying the SDLC model?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!