1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
12

Sadie helman runs a web site for amateur snowboarders. she likes to post videos and music related to snowboarding on her site as

well as interviews with different snowboarding professionals. sadie should use which element to create a background sound that follows xhtml specifications?
Computers and Technology
1 answer:
tigry1 [53]3 years ago
5 0
In order for Sadie to provide a background sound on her videos, the element she needs to use is the mp3. It is because whenever sound is provided in videos and formats in music, it is best to use the format of mp3 because this is the usual format used universally for music rather than other formats that are only used for a specific kind.
You might be interested in
DeShawn uses Google Ads. He wants to enable website call conversion tracking so he can see how his current ad campaign is drivin
eimsori [14]

Answer:

A dynamically created Google forwarding number

Explanation:

A temporary number that is used to forward the call that are  assigned to a Google Ads call extension is called Google forwarding number. This number is used to forwards calls to the advertiser's phone number for the purpose of tracking call conversions.

These number are created dynamically to trace the advertisers conversation.

5 0
3 years ago
What is not true about contracts?
Brut [27]
If you sign a contract or official document with your non-dominant hand, you do not have to follow that agreement or set of rules
5 0
3 years ago
Read 2 more answers
What is the term for sending emails that imitate legitimate companies?
Nookie1986 [14]

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

4 0
3 years ago
Read 2 more answers
Complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly.
Masja [62]

Answer:

The program code is completed below

Explanation:

Program Code:

"""

  Your Name

  Course Name, Section (example: ENTD200 B002 Spr15)

  Instructor name

  Week #

  Date completed

"""

months = ["January ", "February", "March", "April", "May", "June", "July"

, "August", "September", "October", "November", "December"]

for i in range(0,12):

print("Month",i+1, "is" , months[i])

6 0
3 years ago
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
Other questions:
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Digital art is created by using __?
    5·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • Which feature is used to change how a presentation moves from slide to slide?
    14·1 answer
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • The computer components that enables a computer to send and receive data, instructions or information from one or more computers
    13·1 answer
  • "code is broken down by the computer until it is in _____and is a very long series of ons and offs
    11·2 answers
  • Cite some improved technology this 2021?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!