1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
6

Please Do Solve it guys...

Computers and Technology
1 answer:
asambeis [7]3 years ago
5 0

Answer:

Explanation:

I assume the question is the number 4, because there is no question about the types of computer, in this case, there are different types of HTML tags, for example:

<u>Basic tags</u>

<!DOCTYPE> Defines the document type

<html> Defines an HTML document

<head> Defines information about the document

<u>Formatting</u>

<address> Defines contact information for the author

<code> Defines a piece of computer code

<strong> Defines important text

<u>Forms and Input</u>

<form> Defines an HTML form for user input

<input> Defines an input control

<button> Defines a clickable button

<output> Defines the result of a calculation

You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
Wite 3 names of computers used in 1st generation of computers?
enyata [817]
Here are some of the computers used in the first generation of computers:
ENIAC
EDVAC
UNIVAC
IBM-701
IBM-650
These are some of the first computers ever that led to today's computers.
5 0
3 years ago
The point of (18 ,0) lies on​
zysi [14]
This point lies on the x value
4 0
3 years ago
Read 2 more answers
In full screen reading view the blank is reduced
aksik [14]

Answer is: Yes

<u>Explanation:</u>

Word includes a full-screen mode that minimizes the extraneous information (tools, menus, etc.) displayed on the screen. The normal way of switching to full-screen mode is to display the View tab of the ribbon and click Full Screen Reading in the Document Views group. (If you are using Word 2013 or Word 2016 click Read Mode in the Views group.) You can also click the Full Screen Reading view icon (Read Mode view icon Word 2013 and Word 2016) near the right side of the Status bar located at the bottom of the document window. You exit the mode by either clicking the Close button (upper-right corner of the screen) or by pressing Esc.

4 0
3 years ago
Give example of a biometric authentication device​
seropon [69]

Finger Print Scanner, Spit Sample, Face ID

7 0
3 years ago
Other questions:
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • Which group of commands all appear on the Standard toolbar?
    9·2 answers
  • What tabs found in the Windows Task Manager dialog box
    7·1 answer
  • The declarations and statements that compose the method definition are called the __________.
    9·1 answer
  • Does anyone know what i did wrong?
    13·1 answer
  • What is the standard unit used to measure mass?​
    9·1 answer
  • How many times will the loop body execute:
    7·1 answer
  • Carlos has become pretty efficient at using the Word Processor but he takes time to use the menu each time he saves, prints and
    12·1 answer
  • Roles of computer in business areas​
    5·1 answer
  • How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private go
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!