1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
12

Use the ________ method to write text to a web page.

Computers and Technology
1 answer:
Nastasia [14]3 years ago
3 0
Document.write()

I'm not sure that this is a method, but I think this is right. 
You might be interested in
You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
Rainbow [258]

Answer:

You should configure the user account control.

Explanation:

Behavior of the elevation prompt for standard users setting in Group Policy to Prompt for credentials.

4 0
3 years ago
Care should be taken whenever you post comments or photos to any social media or other websites, because each of these online ac
REY [17]

Answer:

True

Explanation:

Building your personal brand requires extreme care when it comes to social media presence. In the age of internet there is nothing hidden, so whatever you post or comment will be seen by your audience and it can go in either way. It can either make your brand or break it. It is of utmost importance to leave a pleasant and positive impact on your audience. One should not indulge in inappropriate or controversial debates and try to avoid being too personal on social media.  

6 0
3 years ago
What is a good computer i should get
algol [13]

Answer:

MacBook or a Dell computer in my opinion

Explanation:

5 0
2 years ago
Read 2 more answers
Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
Dmitry_Shevchenko [17]

Answer:

Importance of backup in system administration:

Backups are crucial in system administrations for preserving continuity and protecting against specific types of hardware failures, service interruptions, and human mistakes. To aid a company in recovering from an unexpected catastrophe, backup copies make it possible to restore data to a previous point in time. To safeguard against primary data loss or corruption, it is essential to save a copies of data on a different media. When a system administrator create a backup, he makes a copy of the data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. System backup and recovery is therefore a crucial skill for system administrators as well as the companies they work for.

Three methods for performing backup:

  1. Disk image: A efficient method to back up not only the files and directories but also everything else on the system is by creating a disk image. If a user have a disk image, the user can restore everything, including the operating system, applications, data, and more, so the user won't have to worry about any difficulties. Placing the  disk image-containing DVD into the DVD-ROM to restore the backup. Additionally, just attach an external HDD to the computer if the user have a disk image that they made.
  2. External hard drive: The most common backup method is to use an external hard drive or even a USB flash drive. An HDD can be easily, quickly, and affordably backed up. It is effective since consumers may carry their portable backup with them wherever they go.
  3. Cloud backup: Cloud backup or Online backup has been around for a while, but not many people really utilize it. But the greatest backup technique by far is cloud backup. The user does not have to worry about hardware problems because their files are saved in the cloud and can be accessed from anywhere because the backups are automatically produced and everything is synchronized. It is one of the greatest methods to backup, especially when you consider that the contents are encrypted and stored securely.

6 0
2 years ago
I need a 2's partner in rl if you're silver or gold. or any rank to just chill with
Semenov [28]

Answer:

I'm a beginner but I go you!

Explanation:

5 0
2 years ago
Other questions:
  • How do I turn of the noise canceling feature on my beats studio wireless?
    13·1 answer
  • Portraits should not ever include any objects other than the person. <br>True <br>False
    11·1 answer
  • How fast is light? person that answers this will get points ​
    12·1 answer
  • The idea that innovations in transportation and communication technologies has changed the way we think about distance and time
    9·1 answer
  • What to do when you accidentally delete usb drivers?
    8·1 answer
  • Why does my inbox keep getting notifications and then disappearing?
    15·2 answers
  • MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check thi
    10·2 answers
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • Which item can you add using the tag?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!