1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
7

Which Display Ad format should you use if you're concerned about malware and want a secure ad experience across platforms?

Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
3 0

Answer:

"AMPHTML ads" is the correct answer for the above question.

Explanation:

  • The "AMPHTML" is used for secure ads, which is written in the form of AMP HTML.
  • It is a lighter and faster ad that has the features of doing the ads securely.
  • It is safe from the virus because it is verified by the software while transferring on the internet.
  • The above question asked about the display which can be used for secure ads. Then the ads are an "AMPHTML" which is described above.
You might be interested in
What is the main function of processing unit​
sattari [20]

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer.

Explanation:

3 0
2 years ago
Read 2 more answers
A(n) __ is a list of main points and sub-points of a topic to include in a presentation
skad [1K]

Main points are  key ideas that support a thesis and helps an audience understand and remember what is most important about a speaker's topic, while sub points are supporting points like <span><span>examples, definitions, testimony, and statistics that support or illustrate a speaker's main points.
</span>A preview is a list of main points and sub-points of a topic to include in a presentation</span>


8 0
2 years ago
Read 2 more answers
Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
ale4655 [162]

Answer:

B is more probable option than C

Explanation:

I think its both B and C

3 0
2 years ago
What is application software used for
topjm [15]

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets. A word processor could be classed as general purpose software as it would allow a user to write a novel, create a restaurant menu or even make a poster.

8 0
3 years ago
Why is peer answer always not working? just wondering idk why
Nady [450]
Wait.....What do you mean?
5 0
3 years ago
Read 2 more answers
Other questions:
  • When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit. Write a program that will help
    6·1 answer
  • NEED HELP(10 POINTS) PLEASE HELP MATH
    8·2 answers
  • What are the three business writing formats
    12·1 answer
  • A ____ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet)
    14·1 answer
  • The advent of optical discs was made possible by developments in ____ technology.
    5·1 answer
  • Harry Potter and his friends are at Ollivander's with Ron, finally replacing Charlie's old broken wand. Hermione decides the bes
    11·1 answer
  • Whic flag has a special role in debuging
    6·1 answer
  • Which command could you use to change to the /usr directory using a relative pathname?
    8·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
  • Consider the following variable declarations and initializations.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!