1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
8

Source view shows your website_____ A) exactly as it would appear when published B) approximately as it would appear when publis

hed C) both as it would appear to user's online and in HTML code D) in HTML code
Computers and Technology
2 answers:
Georgia [21]3 years ago
7 0
In html code so the answer is d
Monica [59]3 years ago
5 0
The Answer is D - in HTML code.
Thank You!
Pls mark Brainliest....
You might be interested in
When the computer is turned on, the operating system is loaded from the hard disk to the _________________. *​
Pavlova-9 [17]

Answer:

The main memory (ROM)

7 0
3 years ago
The object-oriented techniques to manage errors such as dividing a value by 0 comprise the group of methods known as
charle [14.2K]
The object - oriented techniques to manage errors such as dividing a value by 0 comprise the group of methods known as Error handling. Error handling is managing the mistakes made on any type of scenario. This skill is needed to all IT and Computer Science majors.
6 0
4 years ago
2. Assuming that the bits in an integer are numbered from 0, from right (least significant) to left (most significant), write an
3241004551 [841]

Answer:

Explanation:

Two ways of interpreting this question

(I) Shifting all the bits along with the choosen four,

in that case it will be i1>>2;

(ii) Just shifting the choosen four bits and keeping the remaining as it is.

It is equivalent to replacing the first four bits of i1 with i1>>2. let us call N = i1, and M = i1>>2.

max = ~0 //All one's

//1's through position 4, then all zeros

left = max - ((1<<4) - 1);

So we just have zeros between bits one to four and other are one.

Now final step;

(N&left) | m

4 0
3 years ago
A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
timofeeve [1]

Answer:

Implement better protection and inform the staff.

Explanation:

The situation given in the question can be very alarming for a healthcare organization since the laptops contain critical information and details about the employee's work.

To prevent this from occuring again in the future, the organization should educate their employees on cyber security and having a strong password. They also should implement softwares on the computers against such incidents, which can be softwares that can lock the computers and delete files that are important to the organization if an unauthorized entry is detected. In order to protect the information, they can also use a backup system for every computer the employee's use.

I hope this answer helps.

7 0
3 years ago
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (
kupik [55]
<span>Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN). 
a. True 
b. False</span>
5 0
3 years ago
Other questions:
  • A user complains that he cannot access a particular website, although he is able to access other websites. at which layer of the
    5·1 answer
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • List the applications in the CyberOps menu.
    15·1 answer
  • What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for
    10·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • What is the main advantage of using DHCP? A. Allows you to manually set IP addresses B. Allows usage of static IP addresses C. L
    8·1 answer
  • What is co-operating process
    11·1 answer
  • What is a computer?
    9·2 answers
  • Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!