1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
5

The purpose of the ________ element is used to configure the main content of a web page document.

Computers and Technology
1 answer:
Bingel [31]3 years ago
4 0
The answer would be "Inspect"
You might be interested in
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
The simple concept of personal computing, hatched by several Silicon Valley entrepreneurs and permeating almost all of modern so
rjkz [21]

Answer:

True

Explanation:

The advent of personal computing brought about by the implementation of several technologies including MOSFET, semiconductors, microchip and integrated circuits has revolutionized life in at a very high rate of change where traditional ways of doing things rapidly change and for the first time power was easily reachable by accessing a personal computer.

1. The computer personal computer brought about word processing, where there are very limited errors in individually printed documents and the time to produce a quality document was reduced

2. Email - With the advent of personal computers email, the information and communication time were lowered and it resulted in changes in commerce

3. Video conferencing - It was possible to have video conferencing with people and make decisions regarding direction can be made real time from very distant locations, which improved business reaction time

4. The mouse- The concept of having a graphic user interface improved computer interaction for people with limited programming skills.

7 0
3 years ago
What word is used today to refer to network-connected hardware devices?.
lions [1.4K]
Th answer to your question is Endpoint
5 0
2 years ago
2. A host computer with an IP address of 172.16.29.155 using a subnet mask of 255.255.255.0 and a gateway of 172.16.29.1 pings a
ASHA 777 [7]

Answer:

From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

Explanation:

<h2>ADDRESS RESOLUTION PROTOCOL (ARP)</h2>

Address Resolution Protocol (ARP) is a procedure for mapping a logical address known as the IP address to a physical address known as MAC (Media Access Control) address in a local area network. The job of the ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice-versa when using IP Version 4 (IPv4) to communicate on the network.

Most of the computer programs/applications use logical address (IP address) to send/receive messages, however, the actual communication happens over the physical address (MAC address) this happens in the layer 2 of the OSI model. An ARP request is a broadcast, and an ARP response is a Unicast.

Scenarios when ARP is used:

Scenario-1: The sender is a host and wants to send a packet to another host on the same network.

·        Use ARP to find another host’s physical address

Scenario -2: The sender is a host and wants to send a packet to another host on another network.

·        Sender looks at its routing table.

·        Find the IP address of the next-hop (router) for this destination.

·        Use ARP to find the router’s physical address

Scenario -3: the sender is a router and received a datagram destined for a host on another network.

·        Router checks its routing table.

·        Find the IP address of the next router.

·        Use ARP to find the next router’s physical address.

Scenario -4: The sender is a router that has received a datagram destined for a host in the same network.

·        Use ARP to find this host’s physical address.

The situation in the question above falls under scenario-1. From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 so to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

7 0
3 years ago
Helllp me you will git 16 points
siniylev [52]

Answer:

False

Hope it helps...

Have a great day :P

8 0
2 years ago
Read 2 more answers
Other questions:
  • A misfire code is a type _______ diagnostic trouble code (DTC).
    5·1 answer
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • The encapsulation unit on the presentation layer of the osi model is
    10·1 answer
  • What are the commands used in windows 2012 to mount the nfs share on the linux server?
    8·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • What is ur Favorite anime
    8·1 answer
  • What are the characteristics of a severe storm
    12·1 answer
  • Compile and Execute a Program
    13·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!