1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
9

How do you bookmark a website in each of the internet browsers?

Computers and Technology
1 answer:
vekshin13 years ago
5 0

Answer:

Following are the steps which are given below in the explanation part we will bookmark the website in the browser.

Explanation:

Following are the steps:

  • Open the internet web browser.
  • Press right click of the mouse in the empty portion of the web page or press the CTRL+D. After that select the Add to favorite option from there. There is a dialog box is appears on the web page filling the name of the bookmarks and press the add button on it.  

With the following steps, we will bookmark a website in internet browsers.

You might be interested in
Consider a pipelined than can issue up to one instruction per cycle, but fewer may be issued because of pipeline hazards, multi-
a_sh-v [17]

Answer:

Achieved Instruction per cycle rate is 4.11\times 10^{15}

Solution:

As per the question:

Execution time, t = 1.4 s

No. of instructions being executed, n = 1.8 billion =

Clock speed of CPU, f = 3.2 GHz = 3.2\times 10^{9} Hz

Now, to calculate the actual issue rate achieved:

CPI (Cycle per Instruction) = \frac{t}{n\times f}

CPI = \frac{1.4}{1.8\times 10^{6}\times 3.2\times 10^{9}}

Instruction per cycle is given as the reciprocal of CPI:

Instruction per cycle = \frac{1.8\times 10^{6}\times 3.2\times 10^{9}}{1.4} = 4.11\times 10^{15}

6 0
3 years ago
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
3 years ago
The function below takes two arguments: a dictionary of strings (keys) to integers (values) a_dict and a list of strings key_lis
vitfil [10]

Answer:

  1. def getData(a_dict, key_list):
  2.    result = []
  3.    for key in key_list:
  4.        result.append(a_dict[key])
  5.    
  6.    return result  
  7. result = getData( {"puffin": 5, "corgi": 2, "three": 3} , ["three", "corgi"])
  8. print(result)

Explanation:

Let's define a function <em>getData() </em>with two parameters,<em> a_dict </em>and <em>key_list</em> as required by the question (Line 1).

Since the function is to return a list of associated values of dictionaries, a new list,<em> result</em>,  is declared and initialized with empty values (Line 2).

Next, use for-loop to traverse through every string in the input <em>key_list </em>(Line 4) and use the traversed key to address the value in the<em> a_dict </em>and add it to the <em>result</em> list (Line 5)

At last, return the <em>result </em>list as output (Line 7)

We can test the function using the test case from the question and we shall see the output as follows:

[3, 2]

8 0
3 years ago
Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-
Ivenika [448]

Answer:

Is this coding?

Explanation:

5 0
3 years ago
The creation of MySpace pages by candidates in the 2008 Presidential Election is an example of the use of ___________________ to
jarptica [38.1K]
This is descriptive of the use of mass media.
7 0
4 years ago
Other questions:
  • You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
    9·2 answers
  • What does the rule of five say?
    12·2 answers
  • How many responses does a computer expect to receive when it broadcasts an ARP request?why?
    12·1 answer
  • Match the spacing options to their meanings.
    15·2 answers
  • What does SFA software provides tools for
    11·2 answers
  • What electronic appliances at your home / school can be controlled remotely? Name any 4
    7·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • Create a list called courses containing the names of your current courses.
    9·1 answer
  • Are tigers and goldfish related
    13·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!