1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
12

​the _____ area of a webpage contains the copyright and contact information.

Computers and Technology
1 answer:
snow_tiger [21]3 years ago
5 0
The footer area of a website contains the copyright and contact information.
You might be interested in
What are the use of simple machine​
Advocard [28]

Answer:

Simple machines are useful because they reduce effort or extend the ability of people to perform tasks beyond their normal capabilities. Simple machines that are widely used include the wheel and axle, pulley , inclined plane, screw, wedge and lever.

Explanation:

7 0
3 years ago
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles t
shusha [124]

Answer:

The answer is "Semantic".

Explanation:

It can be designed as an enhanced country-wide mobile version and represents a useful way to view the information as a globally connected database.

  • It is the network of information, that can be linked and processed effectively by machines instead of by human workers.
  • It is one of the creation of the Web, which is originally imagined a series of concepts, that allowed machines to better index websites, issues, and subjects.
4 0
3 years ago
1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
Mazyrski [523]

Answer:

See explaination

Explanation:

Bash Script:

#!/bin/bash

echo "Creating files a.txt, b.txt, c.txt..."

#1

# Create a random number between 1700 to 1800. This is the Kb we are looking for

# And then multiply by 1000 (1Kb = 1000 bytes)

r=$(( ($RANDOM % 100 + 1700) * 1000 ))

# head -c specifies the number of chars to read from the input,

# which is /dev/urandom stream in this case.

# Ideally we should have just used r*1000 to specify number of bytes,

# but since we are pipelining it to base64 to get text chars,

# this conversion will happen in the ratio of 4/3.

head -c $r /dev/urandom | base64 > a.txt

# Hence, we trunctate the file to the exact (random number we generated * 1000) bytes

truncate -s $r a.txt

r=$(( ($RANDOM % 100 + 1700) * 1000 ));

head -c $r /dev/urandom | base64 > b.txt

truncate -s $r b.txt

r=$(( ($RANDOM % 100 + 1700) * 1000 ));

head -c $r /dev/urandom | base64 > c.txt

truncate -s $r c.txt

#3 Use tar command to create all_three.tar from a.txt, b.txt, c.txt

tar -cf all_three.tar a.txt b.txt c.txt

echo $(stat -c "%n: %s" all_three.tar)

#4 Gzip a.txt into a.gz (without deleting the original file) and so on

gzip -c a.txt > a.gz

gzip -c b.txt > b.gz

gzip -c c.txt > c.gz

echo $(stat -c "%n: %s " a.gz b.gz c.gz)

#5 Gzip a.txt, b.txt, c.txt into all_three.gz

gzip -c a.txt b.txt c.txt > all_three.gz

echo $(stat -c "%n: %s" all_three.gz)

#6 Gzip the all_three.tar we created in #3

gzip -c all_three.tar > all_three.tar.gz

echo $(stat -c "%n: %s" all_three.tar.gz)

# Check all files we created with ls command sorted by time in ascending order

ls -ltr a.txt b.txt c.txt all_three.tar a.gz b.gz c.gz all_three.gz all_three.tar.gz

4 0
3 years ago
How to break and argument at a certain symbol in python.
Dima020 [189]

Answer:push both of the people away from each other and try to solve things out

Explanation:

3 0
2 years ago
Your bank contacts you to phone a number supplied in the email. What do you do?
never [62]
Login thru a secure portal and verify messages and then report any issues. also another thing you may call your bank to make sure they are the ones who sent the email.
5 0
3 years ago
Other questions:
  • . True or False? a database breach always involves PII.<br><br> A.true<br><br> B.false
    5·1 answer
  • Physical security controls traditionally include obstacles, alarms, lights, guards, cameras, and responders that produce a(n) __
    15·1 answer
  • How to build an arch bridge​
    5·1 answer
  • The 169.254.78.9 ip address is an example of what type of ip address?â
    8·1 answer
  • Look at the data set below. {6, 7, 12, 5, 7, 11, 10, 7, 6} In this data set, what is the mode?
    9·2 answers
  • HELP ME PLZ QUICK Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took
    6·1 answer
  • GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
    7·1 answer
  • What is dialog box? ​
    7·1 answer
  • Sketch a 3-view orthographic projection of the object shown
    6·1 answer
  • Which describes a set amount of pay received by a worker over the course of a year?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!