1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
13

Which of these codes is best for creating websites?

Computers and Technology
2 answers:
Brut [27]3 years ago
7 0

Answer:

<u><em>B) HTML</em></u> because HTML instructs the browser on how to display text and images in a web page. Recall the last time you created a document with a word processor. Whether you use Microsoft Word or Wordpad, Apple Pages, or another application, your word processor has a main window in which you type text, and a menu or toolbar with multiple options to structure and style that text.

crimeas [40]3 years ago
6 0

Answer:

B) HTML because HTML instructs the browser on how to display text and images in a web page. Recall the last time you created a document with a word processor. Whether you use Microsoft Word or Wordpad, Apple Pages, or another application, your word processor has a main window in which you type text, and a menu or toolbar with multiple options to structure and style that text.

You might be interested in
There is a population of owls in a forest. In one year there are 20 new owls born and 10 owls die. In this same year, 5 owls ent
Simora [160]

Answer:

The owls population increased by 13 in one year

Explanation:

The given data on the owl population are as follows;

The number of new owls born = 20 (positive increase in population)

The number of owls that die = 10 (negative decrease in population)

The number of owls that enter the forest = 5 (positive increase in population)

The number of owls that left the forest = 2 (negative decrease in population)

Let 'w' represent the number of new owls born, let 'x' represent the number of  owls that die, let 'y' represent the number of owls that enter the forest and let 'z' represent the number of owls that left the forest, we get;

The change in population, ΔP = w - x + y - z

By plugging in the values, we get;

ΔP = 20 - 10 + 5 - 2 = 13

The change in the population of owls in one year is an increase in 13 owls.

4 0
3 years ago
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employ
lisabon 2012 [21]

Keeping the fact in mind that network access has been found to be slow and after questioning the employees, the network administrator learns that an employee downloaded a third-party application which turns out to be a scanning program for the printer.

<u>Explanation:</u>

The employee must have been unaware of the fact that the application was accompanied by a worm or a computer worm.

A computer worm is a type of malware that has a property to replicate itself and after infecting a particular computer increases its range and gets in the other computers working on the same network which is the main reason for reduced processing speed.

3 0
3 years ago
What is the different between the patch Tool and the Headling Brush tool?​
KonstantinChe [14]

Answer:

Explanation:

The Healing Brush and Patch tools add extra features. They match the texture, transparency, lighting, and shading of the sampled area. Instead of replacing them, pixel for pixel, like the clone stamp. This causes the painted pixels to blend seamlessly into the rest of the image. Using the Healing Brush tool: 1. Select the Healing Brush tool in the toolbox.

7 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Grades are numbers or ________ that show how a student performed in a course.
zloy xaker [14]
It’s either letters or percentages
8 0
3 years ago
Read 2 more answers
Other questions:
  • In presentation software, what is the area that displays behind the information you place on a slide?
    5·1 answer
  • 3 to the power x + 1 equal to 9 to the power 2x + 1​
    15·1 answer
  • Where can audiovisual technology and materials be found? (Select all that apply.)
    14·1 answer
  • The largest distribution of software cost will be when in the programs life cycle?
    12·1 answer
  • Se Statements
    6·1 answer
  • What is difference between rand() and srand() ?
    11·1 answer
  • List the five body functions that monitor homeostasis.
    7·1 answer
  • As a student, how will you avoid those problems/case in the community?​
    14·2 answers
  • I want to make a game with a friend. I use visual studio code. How do I work on the game with him? Like can he edit the same tim
    10·1 answer
  • Question 1 (1 point)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!