1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
4 years ago
6

What file is being called by this IMG tag?

Computers and Technology
2 answers:
puteri [66]4 years ago
7 0
Hello!
.
The answer to your question is image.
.
The file with an .IMG tag is an image.
:)
Triss [41]4 years ago
4 0
The IMG tag is an image in an HTML page.
You might be interested in
Cui documents must be reviewed to which procedures before destruction?
Aliun [14]

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

8 0
3 years ago
All banks follow the same guideline for determining if an applicant qualifies for a loan.
dimaraw [331]

Answer:

I think false

Explanation:

I don't really know but if you get it wrong I'm so deeply sorry

8 0
3 years ago
Explain how the operating system controls the software and hardware on the computer?
NemiM [27]

<em>One of the features of Operating System is </em><em>it manages and communicates with your system hardware </em><em>by means of Drivers. </em>

<em>Drivers </em><em>are special software within the OS that interacts to the hardware. Drivers uses kernel, a part of the operating system that functions intended to it. For example, when you press Ctrl and P keys on the keyboard, the kernel would recognize this command and would trigger the corresponding hardware in relation to this command. In this case, the corresponding hardware is printer. The kernel would tell the printer to print the document.</em>

8 0
3 years ago
Write a static method that takes a String and returns an integer. Return the number of characters in the passed in, String param
patriot [66]

Answer:

Explanation:

The following code is written in the Java programming language. It is a function called howBig that takes in a String as a parameter and returns an int. The function grabs the string and then detects the size of the String (number of Characters it has) and then places that number into an Integer variable called wordSize. Then it returns the variable wordSize.

public static int howBig (String myWord) {

       int wordSize = myWord.length();

       return wordSize;

   }

4 0
3 years ago
What is another name for an unmanaged switch?
Natalka [10]

Answer:

The answer is "Plug and play".

Explanation:

A switch with minimum debugging tools for log-and-play simplicity and also no IP address. The Unmanaged switches are cost-effective and also have limited power, and other choices are not correct, which can be described as follows:

  • Fast Ethernet provides 10 to 100 Mbps speeds, that's why it is not correct.
  • Gigabit provides bandwidth, which is up to 1 Gbps speed, and it is 10 times faster than Ethernet Fast, that's why it is wrong.
  • The trunk provides the link design that's why it is not correct.
7 0
3 years ago
Other questions:
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 400 mse
    9·1 answer
  • Kayle is building a web form. He has included space where users can input their phone numbers and email addresses. However, he w
    15·1 answer
  • Which of the following is an open-source web browser?
    8·2 answers
  • If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
    13·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • Describe the three essential characteristics of an object fromthe perspective of object oriented paradigm.
    7·1 answer
  • Most widely used insulator for splices of smaller wires
    13·1 answer
  • In the earliest stages of human history, what was the only medium?
    10·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!