1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
12

What is the use of form in HTML​

Computers and Technology
1 answer:
icang [17]3 years ago
5 0

Answer:

to make the internet faster

Explanation:

becuase it will have a faster act on the computer so the computer could process the information for it later to be used

You might be interested in
A(n) ____ algorithm is a set of specific, sequential steps that describe in natural language exactly what a computer program mus
Paul [167]
<span>The answer is algorithm, because computer programmers need a programming language that's more similar to their native language. They then write specific steps a computer must take to complete the task at hand. Machine code is not easily memorized and is foreign to most people.</span>
8 0
4 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
You are required to justify the need to implement a three-tier campus network. Which justification below makes sense for a three
Murrr4er [49]

Answer:

Correct answer is (d) Scalable solution for an enterprise environment

Explanation:

Scaling and enterprise simply means adding up resources to the business need. By adding hardware (s) or by upgrading the existing hardware without changing much of the application, one will be able to implement a three-tier campus network.

8 0
3 years ago
Write a program that will accept n number of integers from the keyboard. When the loop exits output the largest and smallest val
Andre45 [30]

Answer:

Explanation:

n = eval(input('Enter # of number you want to enter: '))

list_=[]

for i in range(n):

   number = eval(input("enter number: "))

   list_.append(number)

   if i == n-1:

       maximum = max(list_)

       minimum = min(list_)

       print("maximum : "+str(maximum))

       print("minimum : "+str(minimum))

   

6 0
3 years ago
The digital wallet stores a user’s payment information such as bank account and credit card numbers, a __________ to identify th
lesya [120]

Answer:

Digital Certificate

Explanation:

3 0
3 years ago
Other questions:
  • What is a good monitor for console gaming? (Any price)
    13·2 answers
  • Henry is studying the effects of deforestation along the slopes of hills and mountains. He wants to take a photo of a mountain s
    14·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Write a Python 3 program to read from a .csv file containing rates from power companies. Your program should determine the avera
    13·1 answer
  • What is also known as computer Network?
    6·2 answers
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
  • Mention any
    14·1 answer
  • Effective online learning method for students
    5·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!