1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
7

The World Wide Web Consortium enforced a stricter set of standards in a different version of Hypertext Markup Language (HTML) ca

lled _____.
A) Hypertext Mark-up Language (HTML) 4.01
B) Extensible Hypertext Mark-up Language (XHTML)
C) Extensible Mark-up Language (XML)
D) Dynamic Hypertext Mark-up Language (DHMTL)
Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

Option B is the correct answer for the above question

Explanation:

XHTML is an advanced version of HTML language which is recommended by W3C. It set the standard in 26-JAN-2000 for the XHTML which belongs to the family of HTML. XHTML is made with the help of XML and also used like XML. It used to create more secure websites.

The Above question asked about the W3C recommendation but the above paragraph described that XHTML is a W3C recommendation. Hence Option B is the correct choice answer. while the other is not because--

  • Option A suggests HTML 4.01 which is the updated version of HTML only.
  • Option C suggests XML which is used to data transfer only.
  • Option D suggests about DHTML but XHTML is a W3C recommendation
You might be interested in
True / False<br> The exponent in floating point is stored as a biased value.
horrorfan [7]

Answer:

True

Explanation:

The bias value present in a floating point number deals with the positiveness and negativeness of the exponent part for a floating point number.  The bias value for a floating point number is 127. It means that 127 is always needed to be added to the exponent part of any floating point number.

In a single precision floating point number, we need 8 bits to store the exponent. Rather than storing it as a signed two's complement number, it is easier to simply add 127 to the exponent (because the lowest value that can be in 8 bit signed is -127) and simply store it as an unsigned number. If the stored value is bigger than the bias then it would mean the value of the exponent is positive otherwise it is negative, but if they are equal then it is 0.

4 0
4 years ago
The True Confessions of Charlotte Doyle begins with what is called a(n) _____.
drek231 [11]
They evade the social realities of their settings.
7 0
3 years ago
what must you consider when determining the efficiency of an algorithm? select two choices. group of answer choices the amount o
ozzi

If an algorithm's resource consumption, often referred to as computational cost, is at or below a certain threshold, it is said to be efficient. Generally speaking, "acceptable" indicates that it will operate on a machine that is available in a fair amount of time or space, usually based on the size of the input.

<h3>Explain about the efficiency of an algorithm?</h3>

Growth requires an understanding of an algorithm's effectiveness. Programmers write code with the future in mind, and efficiency is essential to achieve this. Reducing the number of iterations required to finish your task in relation to the size of the dataset is the goal of efficient algorithm development.

The use of asymptotic analysis can frequently help to solve these issues. As the size of the input increases, asymptotic analysis quantifies an algorithm's effectiveness or the program that implements it.

To express how time-consuming a function is, we use a method called "Big O notation." We use the Big O notation, a language, to describe how time-consuming an algorithm is. It's how we assess the value of several approaches to an issue, and U supports our decision-making.

To learn more about efficiency of an algorithm refer to:

brainly.com/question/13801939

#SPJ4

4 0
1 year ago
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
Pavel [41]

Answer:b. technical feasibility

Explanation: Technical feasibility is an important tool for both troubleshooting and maintenance,it is the process through which an expert evaluates a process or a product in order to determine what can either be achieved or to the extent to which a certain action will lead to a tangible result.

Technical Feasibility is one of the most important factor when making decisions on the use of materials or equipments in a particular environment or condition.

8 0
3 years ago
Other questions:
  • What protocol must be supported by routers in order to utilize remote assistance easy connect?
    10·1 answer
  • When a browser makes a request for a static web page, the web server a. finds the HTML for the page and renders it b. renders th
    11·1 answer
  • You're creating a table for one of your slides, and need to make some modifications to your table structure. Which of the follow
    14·1 answer
  • Python
    14·1 answer
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • Because it takes time to change an organization’s culture, the ISO must continually monitor security policy compliance. The ISO
    9·1 answer
  • What do level meters show?
    8·1 answer
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • Which four of the following qualify as fair use?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!