1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
13

_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to in

dicate their appearance, function, meaning, or context.
Computers and Technology
1 answer:
sergeinik [125]3 years ago
4 0

Answer:

HTML

Explanation:

HTML is a markup language which is used to present content in a structured way on the document

You might be interested in
For things like school, you should have a more serious:
german

Answer:

who and what do you mean

Explanation:

7 0
3 years ago
What IEEE 802.11 wireless standard supports devices only in the 5GHz range with speeds up to 4.9Gb/s because of accepting data f
yKpoI14uk [10]

The answer is 802.11ac  

802.11ac is a type if IEEE 802.11 wireless standards that supports Multiple Input, Multiple Output antennas on sending and receiving data. This type of wireless connection supports 2.4GHz signal or frequency and data speed transfer up to 4.9Gbps. Each device or antenna can run up to 400Mbps each and the maximum device it can handle is up to 8 antennas.

8 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
The ________ program displays graphics and loading screens during the boot process.
Minchanka [31]
Booting would be complete if the normal, runtime environment has been achieved. A boot loader is a program that loads operating system for the computer after the completion of power on tests. The boot manager is a program that displays graphics and loading screens during the boot process.
3 0
3 years ago
Imagine that you work for a media company, TalentScout. Your job is to find a host for a new web-based reality show that will be
Paha777 [63]

hes gay,shes furry

BOOM

spray with ak-47

you just got your self a double kill 2x points 3x damage multiplyer

ROUND WON

gg ez

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a class that can make comparisons between the efficiency of the common methods from the List interface in the ArrayList an
    5·1 answer
  • _________ involves connecting geographically remote computers into a single network and combining the computational power of all
    6·2 answers
  • Chef is an orchestration tool?<br> Yes or No
    6·2 answers
  • Jack is going for a safari. Which camera should he take with him and why?
    6·1 answer
  • Which function will show 6 as the answer in the following formula<br><br> =_ (36)
    10·1 answer
  • Which of these converts the reciprocating motion of the piston into rotary motion?
    7·1 answer
  • 1k bits equals to how many bits
    12·1 answer
  • Is the following statement valid or invalid? y + 1 = 6​
    8·1 answer
  • Why is the statement if x=y not working in python
    9·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!