1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
6

After creating the home page or any other page of a website and adding content to it, it must be displayed in a browser to view

the completed page. true or false
Computers and Technology
1 answer:
konstantin123 [22]3 years ago
3 0

Answer:

The answer is "True".

Explanation:

The web page is also known as a home page when it collects more than one page, it is called website. In web page designing, it uses the HTML for design a page and is also available via the web or other networks.

  • When we insert a URL address to the Web page, it means, it contains the text, graphics, and hyperlinks to other Web pages and files.
  • It also displays all the data on the page, that's why the given statement is true.
You might be interested in
Which scenario depicts an ethical workplace practice by a business owner
viva [34]

The answer is D. It's asking for the most UNETHICAL not ETHICAL, the answer before me was ETHICAL. Sharing personal data is UNETHICAL.

4 0
3 years ago
Read 2 more answers
Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
Nostrana [21]

Answer:

age=int(input("Enter age"))

if age>=18:

    print("You are Young")

else

   print("You are child")

Explanation:

if you have any query or any problem kindly ask in comment

5 0
3 years ago
Consider sending a 10000-byte datagram into a link that has an MTU of 4468 bytes. Suppose the original datagram is stamped with
AfilCa [17]

Answer:

Number of fragments is 3

Explanation:

The maximum size of data field in each fragment = 4468 - 20(IP Header)

= 4448 bytes

Hence, the number of required fragment = (10000 - 20)/4448

= 3

Fragment 1

Id = 218

offset = 0

total length = 4468 bytes

flag = 1

Fragment 2

Id = 218

offset = 556

total length = 4468 bytes

flag = 1

Fragment 3

Id = 218

offset = 1112

total length = 1144 bytes

flag = 0

5 0
3 years ago
When changing passwords, at least how many characters must be changed from the previous password?
frosja888 [35]

As we change password when

1. we forgot the previous password.

2. when the previous password is leaked due to some reasons.

In case 1 we can change the password to the same as well with no change the problem will be solved but for case 2 at least one or for more safety all characters should be changed.

8 0
3 years ago
Write a class named Taxicab that has three **private** data members: one that holds the current x-coordinate, one that holds the
Licemer1 [7]

Answer:

See explaination

Explanation:

class Taxicab():

def __init__(self, x, y):

self.x_coordinate = x

self.y_coordinate = y

self.odometer = 0

def get_x_coord(self):

return self.x_coordinate

def get_y_coord(self):

return self.y_coordinate

def get_odometer(self):

return self.odometer

def move_x(self, distance):

self.x_coordinate += distance

# add the absolute distance to odometer

self.odometer += abs(distance)

def move_y(self, distance):

self.y_coordinate += distance

# add the absolute distance to odometer

self.odometer += abs(distance)

cab = Taxicab(5,-8)

cab.move_x(3)

cab.move_y(-4)

cab.move_x(-1)

print(cab.odometer) # will print 8 3+4+1 = 8

7 0
3 years ago
Other questions:
  • Select the correct answer.
    7·2 answers
  • Wordwrap forces you to stop typing words and press the enter key at the end of each line.
    12·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • What are the benefits and risks of a client-server network?
    5·1 answer
  • Compared with other PC operating systems, the Linux-based operating systems:
    13·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!