1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
3 years ago
9

When you start a browser, it automatically loads and displays a page from a web site. This is known as your ____. Class: compute

r essentials
Computers and Technology
1 answer:
EastWind [94]3 years ago
6 0

Answer:

Index page.

Explanation:

The index page is the URL or local file that automatically loads when a web browser starts and when the browser's 'home' button is pressed. The term is also used to refer to the front page, web server directory index, or main web page of a website of a group, company, organization, or individual.

You might be interested in
If you have downloaded this book's source code from the companion Web site, you will find a file named text.txt in the Chapter 1
Lubov Fominskaja [6]

Answer:

Explanation:

The following python code loops through each line within a file called text.txt and counts all the words, then it divides this count by the number of sentences in the text file. Finally, output the average number of words per sentence.

f = open("text.txt", "r")

all_words = 0

sentences = 0

for x in f:

   list = x.split(' ')

   all_words += len(list)

   sentences += 1

average = all_words / sentences

print("There are an average of " + str(average.__round__()) + " words in each sentence.")

6 0
3 years ago
HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP
Arturiano [62]

Answer:

what is it that u need help with

Explanation:

8 0
3 years ago
Read 2 more answers
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
2 years ago
Why is accessing a disk block expensive? discuss the time components involved in accessing a disk block. (?
Dahasolnce [82]

Answer:

Explanation:

A disk block works by transferring data between the disk and main memory units which are called the blocks, whose size can range drastically from 512 bytes to several thousand.  This data is converted to hardware-level cylinder, surface, and sector number  which makes accessing the data immensely slower than accessing data in the main memory. This time constraint is also the main reason as to why accessing a disk block is so expensive.

6 0
3 years ago
You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
Virty [35]

Answer:

volume mount points

Explanation:

The best thing to do would be to use volume mount points. This is a feature that allows you to mount/target (from a single partition) another folder or storage disk that is connected to the system. This will easily allow the user in this scenario to access the different files located in the D: and E: drive from the C:\ drive itself. Without having to go and find each file in their own separate physical drive on the computer.

6 0
3 years ago
Other questions:
  • A(n) _______________ loop usually occurs when the programmer forgets to write code inside the loop that makes the test condition
    13·1 answer
  • Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
    15·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing
    11·1 answer
  • When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
    10·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • What linux command is used to change file permissions?
    10·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Why is group design better or worse for coding projects ?....will report for a dum answer U ` U
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!