1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
4 years ago
6

Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh

en programming web pages on the Internet. Why is that? Consider the HTML code when answering this question. Please consider the different operating systems involved: Microsoft Windows, Apple Macintosh, and Linux (the electron server, Web servers in general)
Computers and Technology
1 answer:
bonufazy [111]4 years ago
4 0
They are not considered the same when programming web pages on the Internet, because it depends on what opereting system you're using to create web-site. Every OS use different <span>character encoding capable. You can avoid that by entering utf-8 (or smth like that) in your html file.</span>
You might be interested in
True / Fasle
Liono4ka [1.6K]

Answer:

False

Explanation:

3 0
3 years ago
It is not necessary to develop strategies to separate good information and bad information on the internet. True or False
Reptile [31]

The answer is False. You should always try to separate the information that could do harm, or isn't true.

6 0
3 years ago
The it components of an erp system architecture include the hardware, software and the ________
natta225 [31]

The components of an ERP system architecture is made up of the hardware, software and the Data.

<h3>What is an ERP system?</h3>

Enterprise resource planning (ERP) is known to be a kind of  software that firms often use to handle or manage day-to-day business works such as accounting and others.

Note that The components of an ERP system architecture is made up of the hardware, software and the Data.

Learn more about  ERP system from

brainly.com/question/14635097

#SPJ12

6 0
2 years ago
Which line of code will use the overloaded multiplication operation?
maks197457 [2]

Answer:

def __mul__(self, b):

Explanation:

correct edge 2021

4 0
3 years ago
A(n) ____________ is a private data network that creates secure connections over regular internet lines.
Setler79 [48]
VPN is the correct answer
5 0
4 years ago
Other questions:
  • You decide to buy some stocks for a certain price and then sell them at another price. Write a program that determines whether o
    9·1 answer
  • Consider the recursive method myprint in this code snippet: public void myprint(int n) { if (n &lt; 10) { system.out.print(n); }
    5·1 answer
  • I have tried installing "windows media player" on my computer but at a point, something disrupts its instalment or I am asked to
    7·1 answer
  • What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking
    7·1 answer
  • Technician A says that volatility describes how hard it is for gasoline to evaporate. Technician B says that Reid vapor pressure
    8·1 answer
  • The Operating System is used to locate, move, and copy files.
    10·1 answer
  • To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
    9·2 answers
  • Which area of government regulations do the Fair Credit and Reporting Act
    8·2 answers
  • C#
    10·1 answer
  • For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!