1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
15

How do you find specific words on a web page ...?? I know theres a shortcut for highlighting a specific word on a webpage on fir

efox. I just completely forgot what it was...; Thanksssss!...haha duh I'm pretty sure its one of the F keys....helpp! I dont want to have to read all of this to find what Im looking forr!?
Computers and Technology
1 answer:
aniked [119]3 years ago
5 0
If you are on a desktop computer you can press the top row key "F3" and a little box will pop up and you can type the word you are looking for in there and it will find that word on the page you are on and take you straight to it.
You might be interested in
Define an __init__ method that has all the field names as parameters (in the order they appear in the second argument to pnamedt
mario62 [17]

<!DOCTYPE html PUBLIC "-//IETF//DTD HTML//EN">

<html><head>

<meta http-equiv="content-type" content="text/html; charset=UTF-8">

 <title>Program 3</title>

</head>

<body bgcolor="white">

<center>

<h1>Program 3</h1>

<h1>

Programs that Write Programs: pnamedtuple

</h1>

<p>

</p><h2>ICS-33: Intermediate Programming<br>

</h2>

<p>

</p></center>

<!-- Introduction -->

<a name="Introduction">

<hr align="left" width="33%">

<table rules="none" border="0" cellpadding="5" cellspacing="0" width="100%">

<tbody>

<tr valign="top">

<td width="20%"><b>Introduction</b></td>

<td width="80%">

This programming assignment is designed to show how Python functions can define

 other Python code (in this case, a class) in an unexpected way: the function

 can build a huge string that represents the definition of a Python class and

 then call <b>exec</b> on it, which causes Python to define that class just as

 if it were written in a file and imported (in which case Python reads the

 file as a big string and does the same thing).

Your code will heavily rely on string formatting operations: I suggest using

 the <b>str.format</b> method to do the replacements: now is a good time to

 learn about this function if you don't know already know it; but you are free

 to use whatever string processing tool(s) you want.

<p>

I suggest that you first read the description below and define/test/debug as

 much of the <b>Point</b> class as you can, writing it directly in Eclipse

(especially the<b>__getitem__</b>, <b>__eq__</b>, and <b>_replace__</b>

 methods).

You might want to write a small batch file to help you test this class.

</p><p>

Once you have written/debugged the code for the <b>Point</b> class, define the

 general <b>pnamedtuple</b> function, which when given the appropriate

 arguments (for the <b>Point</b> class: <b>pnamedtuple('Point', 'x y')</b>)

 constructs a huge string containing the same code as the <b>Point</b> class

 you wrote.

Much of the code from your <b>Point</b> class will be turned into strings and

 made generic: generalized for calls to <b>pnamedtuple</b> with different

 arguments.

Use the <b>.format</b> method to replace the generic parts with the actual

 strings needed for the class being defined.

5 0
2 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
A firewall filters traffic.true or false
valentinak56 [21]
Its TRUE firewalls filters traffic
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.Firewall typically establishes a barrier between a trusted internal network and untrusted external network such as the internet.
4 0
3 years ago
I need help with coding, why isn't this command working pls help
astraxan [27]

Answer:

You type error word

8 0
3 years ago
Read 2 more answers
What is the code for command prompt?
Anna35 [415]
The code is batch also know as .bat to make a "hello world" program you would simply put:
@echo off ##this turns off c:/ ect..
Echo Hello World ##displays Hello World
Pause ##Pauses the program until you press a button
8 0
2 years ago
Other questions:
  • When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by
    5·1 answer
  • Write a function chat accepts a pointer to a C-string as its argument. The function should count the number of vowels appearing
    5·1 answer
  • Entering the formula =SUM(C5:C18), in cell C19 will result in which of the following?
    7·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • A​ _______ helps us understand the nature of the distribution of a data set.
    10·1 answer
  • Robert's got a quick hand
    8·2 answers
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • I think i have a virus on my computer what am i supposed to do
    10·1 answer
  • The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
    8·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!