1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
11

___________is a standard for exchanging structured data over the web. It allows creating documents consisting of customized tags

, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations.
Computers and Technology
1 answer:
svetlana [45]3 years ago
6 0

Answer:

The answer is "XML"

Explanation:

Extensible Markup Language is a marking language, which specifies a collection of document. It uses the coding rules, which is readable for both man and computer.  

  • It is a scalable way of creating data formats and sharing structured data through the internet or private networks digitally.
  • It permits the development of custom tags to identify, transfer, verify and view data among apps and organizations.
You might be interested in
Select the phrases that apply to Java classes or methods.
oee [108]

Answer:

graficar una lista de entradas

graficar una lista de entradas

crear un nuevo objeto

condiciones de prueba

romper un ciclo

romper un ciclo

Explanation:

7 0
3 years ago
Files and folders in UNIX can be removed using the
wel

<em>Files and folders in UNIX can be removed using the</em>  <u><em>rm command.</em></u>

<em>The answer is B. rm command </em>

<em>Hope this helps :)</em>

3 0
3 years ago
Whate are some creatures/animals that the robot rex imitates?
Rzqust [24]

<span>The Rex robot imitates the dinosaur perfectly. In terms of its structure, the robot looks like a dinosaur, and this is seen in the robot’s serrated teeth. To some extent, the robot imitates the cheetah due to its speed ability.</span>

3 0
4 years ago
3. Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is c
o-na [289]

Answer:

See explaination.

Explanation:

An algorithm is specifically defined as the step by step method or process of achieving any type of result.

Please kindly see the attached file for the C algorithm that fulfils the answer of the given problem.

3 0
3 years ago
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
ivanzaharov [21]
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

3 0
4 years ago
Other questions:
  • Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.
    11·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • What is first page of website called​
    10·1 answer
  • Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
    15·1 answer
  • What is the primary purpose of endnotes?
    6·2 answers
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • Full meaning of CASE in system analysis
    11·2 answers
  • FREEEEE 100 POINTS COME TAKE COME COME COME<br><br> only if u like da black panther
    8·2 answers
  • 3 uses of a computer ​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!