1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
12

Programs that are embedded in a Web page are called Java ____.

Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
8 0

Answer:

applets

Explanation:

Java applets are dynamic programs that can be embedded on a webpage and run on a web browser like internet explorer,firefox or google chrome. The code for applets is developed using java programming language and facilitates interesting and complex display entities to be included as part of the web page. HTML provides a special tag called <Applet> for providing details of the applet.

You might be interested in
The registrar does all of the following except:
Yuliya22 [10]
The answer is B. Issue report cards of grades.
3 0
4 years ago
Read 2 more answers
Print 1 to 100 in visual basic .6
FrozenT [24]

Answer:

make ( next i ) after ( debug. print ) ​

Explanation:

Its definitely, the above answer. DIM is used for defining a variable which is an integer here. Then the for loop has been used and this will run for 1 to 100 thus as we move under debug,print I. But Next I should come after. Hence first it will be Debug,print I and then the next I .

And hence, the above answer.

The full program will be:

SUB MAIN()

DIM I AS INTEGER

FOR I = 1 TO 100 STEP 1

DEBUG.PRINT I

NEXT I

END SUB

6 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
What are the impacts of mobile phone?as well as the positive and negative impacts?​
Pepsi [2]

The positive impact are :

It can work for a long time.

It can solve millions of calculations in a few seconds and save huge amount of data.

It helps to know about technology and other things.

It can be carry from one place to another place.

The negative impacts are :

It may creates health and unemployment problems.

It is useless without electricity.

It have no self thinking power.

It required a trained person to do work

5 0
3 years ago
Could anyone help me with this assignment please?
kicyunya [14]

Answer:

"Word Processing Assignment

5 0
3 years ago
Other questions:
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • A type of font that has a decorative tail is A.Serif font B. Sans serif font C. Bubbles font D. Reading font
    7·1 answer
  • Computer recycling, electronic recycling or e-waste recycling is the disassembly and Most electronic waste is sent to landfills
    6·1 answer
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • Select the correct answer.
    10·2 answers
  • A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
    9·1 answer
  • Can someone please help me on these short short questions marking Brainly computer modeling people please help
    14·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • (main.c File)
    7·1 answer
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!