1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
15

Which option ie an example of an html end tag

Computers and Technology
1 answer:
Kay [80]3 years ago
8 0
Any end tag in HTML needs to look like this, the word body used in this example is one of the more important elements, but you can replace it to any real element in HTML:
i.e. </body>
You might be interested in
How to revert a dismissed javascript popup alert box in chrome?
xeze [42]
When Google Chrome blocks pop-ups for you, the blocked pop-up alert icon <span>appears in the address bar. If you click on the icon, you can see the pop-ups that have been blocked for that page. If you'd like to allow pop-ups for that specific site:</span><span><span><span>
1. Click the pop-up alert icon  (in the address bar).</span>
</span><span>2. Click the link for the pop-up you'd like to see.
</span><span>3. To always see pop-ups for the site, select "Always show pop-ups from [site]." 

</span></span><span>If you'd like to proactively allow pop-ups for specific sites:
</span><span><span><span>1. Click the Chrome menu   in the top right hand corner of your browser.</span>
</span><span><span>2. Select Settings.</span>
</span><span><span>3. Click Show advanced settings</span>
</span><span><span>4. Under the "Privacy" section, click the Content settings button.</span>
</span><span>5. In the "Pop-ups" section, select "Do not allow any site to show pop-ups." 
</span>6. Click the 'Manage exceptions' button.
<span>7. Type in the url of the site that you'd like to allow pop-ups from.</span></span>
5 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
True [87]

Answer:

OR

Explanation:

"OR" expands a search by telling the database that any of the words it connects are acceptable. This is particularly beneficial when you are searching for synonyms, such as “the victorian age” OR “sexual puritanism”  

So, if you type in “the victorian age” OR “sexual puritanism”, your results will include articles with either term, but not necessarily both.

4 0
3 years ago
(PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
Ludmilka [50]

Answer:

import csv

with open('employee_birthday.txt') as csv_file:

csv_reader = csv.reader(csv_file, delimiter=',')

line_count = 0

for row in csv_reader:

if line_count == 0:

print(f'Column names are {", ".join(row)}')

line_count += 1

else:

print(f'\t{row[0]} works in the {row[1]} department, and was born in {row[2]}.')

line_count += 1

print(f'Processed {line_count} lines.')

Explanation:

Heres an example of how to read csvs

7 0
3 years ago
Interruption attacks are also called ___ attacks:
Lelu [443]

Answer:

Interruption attack are also referred to as Denial Of Service(DOS) attack.

Explanation:

Interruption attack are also called denial of service.The main aim of  interruption attack or Denial Of Srvice attack is to make resources unavailable.

For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.

Hence we conclude that the answer to this question is Denail of Service (DOS).

4 0
3 years ago
Other questions:
  • Which of the following binary (base-2) numbers is LARGEST?
    14·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • In "When Is a Planet Not a Planet?" why does the author say that the outer planets are made of gas when the inner planets are ma
    5·1 answer
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • What is technology? *
    10·1 answer
  • Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!