1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
3 years ago
12

30 POINTS! PLEASE ANSWER QUICK!!!

Computers and Technology
1 answer:
SpyIntel [72]3 years ago
6 0

Answer:

your doctype comes first.

Explanation:

The first thing you should make sure to have in any HTML document you create is a "document type definition (DTD)" declaration.

it defines what elements and attributes are allowed to be used in a certain flavor of HTML

You might be interested in
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
3 years ago
What is the purpose of interrupts? What is a trap? Can traps be generated intentionally by a user program? If so, for what purpo
SpyIntel [72]

Answer:

Interrupt (INT) helps operating system to stop work on one process and start work on other process using interrupt signals.

Explanation:

Purpose of interrupts:

• Interrupts are useful when an I/O device needs to be serviced only occasionally at low data transfer rate.

• For example, when a peripheral requires the attention of the processor to perform an I/ O operation.

A trap:

• also known as an exception or a fault, is typically a type of synchronous interrupt caused by an exceptional condition

• is a software-generated interrupt.

• For example it's caused by division by zero or invalid memory access.

Can traps be generated intentionally by a user program?  Yes.

If so, for what purpose?  

• the usual way to invoke a kernel routine (a system call) because those run with a higher priority than user code.  

• Handling is synchronous, so the user code is suspended and continues afterwards.

• In a sense they are active - most of the time, the code expects the trap.

3 0
4 years ago
How do keygens work?
Artist 52 [7]
What are keygens please

3 0
4 years ago
A personal business letter may be written by ?
disa [49]

Answer:

a college student inquiring about a loan.

Explanation:

6 0
3 years ago
Host A sends two UDP segments to Server S, one to port 1234 and the other to port 2345. Host B sends one UDP segment to Server S
SOVA2 [1]

Answer:

A

Explanation:

8 0
3 years ago
Other questions:
  • What is the term for a web site and network used only by employees within a company?
    12·1 answer
  • Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
    12·1 answer
  • Write a method named circleArea that accepts the radius of a circle as a parameter (as a real number) and returns the area of a
    12·1 answer
  • What are the benefits of maintaining you vehicle?
    11·1 answer
  • Which methods will remove filters? Check all that apply.
    6·2 answers
  • 30 points!
    12·1 answer
  • Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used
    9·1 answer
  • Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that som
    14·1 answer
  • Tell four permanent icons on the desktop​
    14·1 answer
  • What is the purpose of quick access toolbar?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!