1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
12

Use the ________ method to write text to a web page.

Computers and Technology
1 answer:
Nastasia [14]3 years ago
3 0
Document.write()

I'm not sure that this is a method, but I think this is right. 
You might be interested in
When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
Bas_tet [7]

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

5 0
3 years ago
1. Discuss the pros and cons of human-computer interaction technology?
Lana71 [14]

!

gcoo!!Exykgvyukhhytocfplanationufvhyg:

3 0
3 years ago
Which one of the following features can control left and right indents on using markers
QveST [7]
The Feature that can control left and right indents on using markers is Ruler.  The indent marker consists of two triangles and a rectangle.  <span>To change the left indent, click on the very bottom of the indent marker, the rectangle, and drag it to a new position.</span>  <span>The Right Indent is indicated by a single triangle on the Ruler at the current right margin. Click and drag it to change the margin.</span>
3 0
3 years ago
A 4-bit left shift register is initially in the 0000 state, with all the flip flops storing 0s. A group of bits 1011 is serially
frutty [35]

Answer:

0010

Explanation:

Serially left shifted means that the left most bit will enter the register first. The left most bit already stored in the register will move out of the sequence. The "bold" bits mentioned below highlight these left most bits:

Initial State of the Register:

0000

Group of bits entering:

1011

<u>First Clock Cycle:</u>

0000 <em>(This bold bit will move out)</em>

1011 <em>(This bold bit will move in from right side, shifting the whole sequence one place to the left).</em>

The resulting Sequence:

0001

<u>Second Clock Cycle:</u>

0001 <em>(This bold bit will move out)</em>

1011 <em>(This bold bit will move in from right side, shifting the whole sequence one place to the left).</em>

The resulting Sequence:

0010 <em>(Final Answer)</em>

6 0
3 years ago
your brother has made a battery operated torch by using 2 cells &amp; has come to ask you how he may make the torch more powerfu
torisob [31]

Answer: Add more cells in series.

Explanation:

Adding more cells in series will add voltage which will increase the power.

5 0
3 years ago
Other questions:
  • Ming is building an inexpensive computer to use for her online classes, and needs to purchase Windows. What is the most cost-eff
    8·1 answer
  • Where do scanned documents go in windows 10?
    11·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • What kind of video are you are able to watch by downloading it from the Internet?
    10·1 answer
  • Robert's employer has agreed to pay half the tuition for Robert to complete his college degree. This benefit is known as what?
    7·2 answers
  • HELP FAST PLEASE
    6·1 answer
  • What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar
    14·1 answer
  • with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
    11·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
  • Which of the following Access objects provides a user-friendly data entry method?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!