1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
9

Which is the correct attribute syntax

Computers and Technology
1 answer:
taurus [48]3 years ago
3 0

ANSWER:  GIVE ME BRAINLIEST AND ILL GIVE YOU THE ANSWER

EXPLANATION: ALL YOU NEED TO DO IS GIVE ME BRAINLIEST FOR THE ANSWER

You might be interested in
What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the g
Degger [83]

Answer:

spelling and good format

Explanation:thats all i know

8 0
2 years ago
Write a police description a person who know you well​
SIZIF [17.4K]

Answer:

I will be describing Jude. He is a neighbor.

Explanation:

A police description refers to the method of describing a person using high-level detailing. An example is given below:

  1. He is a Five feet-three male caucasian
  2. With brown eyes and
  3. an Australian accent
  4. He has a military haircut
  5. About 38 years
  6. Weighs about 95Kg
  7. and dresses casually
  8. he walks with a slant to the left
  9. a dove tattoed at the back of his neck
  10. and a birthmark on his left ear lobe

Cheers

3 0
3 years ago
Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which fe
Anika [276]
A. Autocorrect is the answer
7 0
3 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
3 years ago
What year did bill gates form traf-o-data?
alexgriva [62]

In 1972 Bill Gates formed Traf-O-Data.

8 0
3 years ago
Other questions:
  • The World Wide Web consists of interconnected computer networks throughout the world that everyone can use. True or False
    13·2 answers
  • In what stage of writing does publishing occur
    14·1 answer
  • Branching is so called because <br>​
    5·2 answers
  • Using the media as equipment for living. Explain how you would use some form of media to serve a purpose in your life—and what t
    6·2 answers
  • Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activat
    5·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • Java supports ________; collections of related methods that typically enable you to tell objects what to do, but not how to do i
    12·1 answer
  • _KOH + _Cu(CIO3)2 - __KCIO3 +<br>_Cu(OH)2​
    12·1 answer
  • PLEASE PLEASE PLEASE PLEASE help me Im completly lost will give brainliest and 50 points
    8·2 answers
  • A software copyright?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!