1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
5

________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with

the browser. VBScript ActiveX ColdFusion JavaScript
Computers and Technology
1 answer:
kotegsom [21]3 years ago
4 0
JavaScript




______________
You might be interested in
Which of the following statements about federal student loans is true?
never [62]
The correct answer is a.<span>) the interest rate on your loan will be fixed over time. 
</span>
7 0
4 years ago
When utilizing the Internet Storage Name Service (iSNS), how can you limit which targets iSCSI initiators can discover and conne
Sati [7]

Answer:

You can limit by devices IQN, DNS name, MAC address, IP address

Explanation:

When you configure an iSCSI target, you define which iSCSI initiators can connect to an iSNSI by the client's IQN. You can also specify which servers can connect to the iSCSI target based on MAC addresses, IP address, and DNS name.

6 0
3 years ago
Flammable and combustible materials should be stored according to: A. Their color B. Their fire characteristics C. Their size
iris [78.8K]

B. their fire characteristics

this should be fairly obvious

6 0
3 years ago
Read 2 more answers
Write a Objective Summary <br><br> 7th Grade by Gary Soto
natka813 [3]

Answer:EL SIGLO 20

Explanation:POR EMILIANO ZPAATA

5 0
3 years ago
Brainliest if correct Analyze (10 points)
ozzi

When expensive machinery is required to install and configure.

2. Most of the employees are not computer literate, so what will you do to manage the situations may oppose by the employee

6 0
2 years ago
Other questions:
  • Please help i really need to turn this in already
    6·1 answer
  • An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL.
    12·1 answer
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • What was the attitude of the U.S. Senate towards the Treaty of Versailles, and why did they have that attitude?​
    9·1 answer
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • Consider the problem of solving two 8-puzzles.
    10·1 answer
  • You can rotate a selected graphic by dragging a ________ rotation handle
    13·1 answer
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • What is a Computer ?and it's demerits​
    13·2 answers
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!