1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
10

QUESTION

Computers and Technology
1 answer:
mojhsa [17]3 years ago
6 0

Answer:

I'm pretty sure the answer is position. sorry if im wrong, though

You might be interested in
____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsu
STALIN [3.7K]
The answer is Object-oriented programming (OOP). This is a type of programming language model on the concept of "objects", which may comprise of data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. The first step here is to classify all the objects the programmer wants to work and how they relate to each other, this is known as data modeling. Once an object has been identified, it is generalized as a class of objects which describes the type of data it comprises and any logic sequences that can manipulate it.
6 0
4 years ago
All character entities end with _____ to signal the browser that everything in between is an entity representing a symbol.
san4es73 [151]

All character entities end <u>with </u><u>;</u><u> to</u> signal the web browser that everything in between is an entity representing a symbol.

<h3>What is a web browser?</h3>

A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

<h3>What is HTML?</h3>

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.

In hypertext markup language (HTML), all character entities generally begin with & and end with ; to signal the web browser that everything in between is an entity which represents a symbol.

Read more on HTML here: brainly.com/question/4056554

#SPJ1

5 0
2 years ago
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
marta [7]

i believe the answer is b.

8 0
4 years ago
Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
OLga [1]

The concept that is been referred to in the statement above is known as data literacy.

<h3>What is data literacy?</h3>

The term data literacy is known to be man's  ability to be able to read data, compose and share data. The  understanding of data sources and how it works it all about  data literacy.

Conclusively, when everyone in a firm are said to be data literate, There will be a lot of improvement in business processes of any firm.

Learn more about data literacy from

brainly.com/question/16514379

7 0
2 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Other questions:
  • What does ADF means????
    13·2 answers
  • What is the most common drive letter where window stores most data and programs. 1,a 2,b 3,c 4,e
    9·1 answer
  • Unless you explicitly initialize global variables, they are automatically initialized to
    5·1 answer
  • What determines how a system will work to meet the business needs defined during system investigation?
    13·1 answer
  • Identify a true statement of a JavaScript program in a web form.
    10·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • Help me? ill do anything ill let u smash me or anything just HELP!
    15·2 answers
  • Animations<br> Animations are !<br> Blank which can be Applied to blank in a presentation?
    7·1 answer
  • A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his lapt
    12·1 answer
  • A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and m
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!